diff options
| -rw-r--r-- | plugins/Makefile.am | 1 | ||||
| -rw-r--r-- | plugins/check_ide_smart.c | 259 | ||||
| -rw-r--r-- | plugins/check_ide_smart.d/config.h | 15 | ||||
| -rw-r--r-- | plugins/check_radius.c | 130 | ||||
| -rw-r--r-- | plugins/check_radius.d/config.h | 6 | ||||
| -rw-r--r-- | plugins/check_real.c | 318 | ||||
| -rw-r--r-- | plugins/check_real.d/config.h | 23 | ||||
| -rw-r--r-- | plugins/check_time.c | 2 | ||||
| -rw-r--r-- | plugins/utils.c | 1 | ||||
| -rw-r--r-- | plugins/utils.h | 2 |
10 files changed, 479 insertions, 278 deletions
diff --git a/plugins/Makefile.am b/plugins/Makefile.am index fa159f4a..a35f273e 100644 --- a/plugins/Makefile.am +++ b/plugins/Makefile.am | |||
| @@ -66,6 +66,7 @@ EXTRA_DIST = t \ | |||
| 66 | check_hpjd.d \ | 66 | check_hpjd.d \ |
| 67 | check_game.d \ | 67 | check_game.d \ |
| 68 | check_radius.d \ | 68 | check_radius.d \ |
| 69 | check_ide_smart.d \ | ||
| 69 | check_curl.d \ | 70 | check_curl.d \ |
| 70 | check_disk.d \ | 71 | check_disk.d \ |
| 71 | check_time.d \ | 72 | check_time.d \ |
diff --git a/plugins/check_ide_smart.c b/plugins/check_ide_smart.c index 16fe3d01..c1325cf9 100644 --- a/plugins/check_ide_smart.c +++ b/plugins/check_ide_smart.c | |||
| @@ -39,6 +39,8 @@ const char *email = "devel@monitoring-plugins.org"; | |||
| 39 | 39 | ||
| 40 | #include "common.h" | 40 | #include "common.h" |
| 41 | #include "utils.h" | 41 | #include "utils.h" |
| 42 | #include "check_ide_smart.d/config.h" | ||
| 43 | #include "states.h" | ||
| 42 | 44 | ||
| 43 | static void print_help(void); | 45 | static void print_help(void); |
| 44 | void print_usage(void); | 46 | void print_usage(void); |
| @@ -46,6 +48,7 @@ void print_usage(void); | |||
| 46 | #include <sys/stat.h> | 48 | #include <sys/stat.h> |
| 47 | #include <sys/ioctl.h> | 49 | #include <sys/ioctl.h> |
| 48 | #include <fcntl.h> | 50 | #include <fcntl.h> |
| 51 | |||
| 49 | #ifdef __linux__ | 52 | #ifdef __linux__ |
| 50 | # include <linux/hdreg.h> | 53 | # include <linux/hdreg.h> |
| 51 | # include <linux/types.h> | 54 | # include <linux/types.h> |
| @@ -77,30 +80,30 @@ void print_usage(void); | |||
| 77 | #define OPERATIONAL 0 | 80 | #define OPERATIONAL 0 |
| 78 | #define UNKNOWN -1 | 81 | #define UNKNOWN -1 |
| 79 | 82 | ||
| 80 | typedef struct threshold_s { | 83 | typedef struct { |
| 81 | uint8_t id; | 84 | uint8_t id; |
| 82 | uint8_t threshold; | 85 | uint8_t threshold; |
| 83 | uint8_t reserved[10]; | 86 | uint8_t reserved[10]; |
| 84 | } __attribute__((packed)) threshold_t; | 87 | } __attribute__((packed)) smart_threshold; |
| 85 | 88 | ||
| 86 | typedef struct thresholds_s { | 89 | typedef struct { |
| 87 | uint16_t revision; | 90 | uint16_t revision; |
| 88 | threshold_t thresholds[NR_ATTRIBUTES]; | 91 | smart_threshold thresholds[NR_ATTRIBUTES]; |
| 89 | uint8_t reserved[18]; | 92 | uint8_t reserved[18]; |
| 90 | uint8_t vendor[131]; | 93 | uint8_t vendor[131]; |
| 91 | uint8_t checksum; | 94 | uint8_t checksum; |
| 92 | } __attribute__((packed)) thresholds_t; | 95 | } __attribute__((packed)) smart_thresholds; |
| 93 | 96 | ||
| 94 | typedef struct value_s { | 97 | typedef struct { |
| 95 | uint8_t id; | 98 | uint8_t id; |
| 96 | uint16_t status; | 99 | uint16_t status; |
| 97 | uint8_t value; | 100 | uint8_t value; |
| 98 | uint8_t vendor[8]; | 101 | uint8_t vendor[8]; |
| 99 | } __attribute__((packed)) value_t; | 102 | } __attribute__((packed)) smart_value; |
| 100 | 103 | ||
| 101 | typedef struct values_s { | 104 | typedef struct { |
| 102 | uint16_t revision; | 105 | uint16_t revision; |
| 103 | value_t values[NR_ATTRIBUTES]; | 106 | smart_value values[NR_ATTRIBUTES]; |
| 104 | uint8_t offline_status; | 107 | uint8_t offline_status; |
| 105 | uint8_t vendor1; | 108 | uint8_t vendor1; |
| 106 | uint16_t offline_timeout; | 109 | uint16_t offline_timeout; |
| @@ -110,7 +113,7 @@ typedef struct values_s { | |||
| 110 | uint8_t reserved[16]; | 113 | uint8_t reserved[16]; |
| 111 | uint8_t vendor[125]; | 114 | uint8_t vendor[125]; |
| 112 | uint8_t checksum; | 115 | uint8_t checksum; |
| 113 | } __attribute__((packed)) values_t; | 116 | } __attribute__((packed)) smart_values; |
| 114 | 117 | ||
| 115 | static struct { | 118 | static struct { |
| 116 | uint8_t value; | 119 | uint8_t value; |
| @@ -133,25 +136,20 @@ enum SmartCommand { | |||
| 133 | SMART_CMD_AUTO_OFFLINE | 136 | SMART_CMD_AUTO_OFFLINE |
| 134 | }; | 137 | }; |
| 135 | 138 | ||
| 136 | static char *get_offline_text(int); | 139 | static char *get_offline_text(int /*status*/); |
| 137 | static int smart_read_values(int, values_t *); | 140 | static int smart_read_values(int /*fd*/, smart_values * /*values*/); |
| 138 | static int nagios(values_t *, thresholds_t *); | 141 | static mp_state_enum compare_values_and_thresholds(smart_values * /*p*/, smart_thresholds * /*t*/); |
| 139 | static void print_value(value_t *, threshold_t *); | 142 | static void print_value(smart_value * /*p*/, smart_threshold * /*t*/); |
| 140 | static void print_values(values_t *, thresholds_t *); | 143 | static void print_values(smart_values * /*p*/, smart_thresholds * /*t*/); |
| 141 | static int smart_cmd_simple(int, enum SmartCommand, uint8_t, bool); | 144 | static mp_state_enum smart_cmd_simple(int /*fd*/, enum SmartCommand /*command*/, uint8_t /*val0*/, bool /*show_error*/); |
| 142 | static int smart_read_thresholds(int, thresholds_t *); | 145 | static int smart_read_thresholds(int /*fd*/, smart_thresholds * /*thresholds*/); |
| 143 | static bool verbose = false; | 146 | static int verbose = 0; |
| 144 | 147 | ||
| 145 | int main(int argc, char *argv[]) { | 148 | typedef struct { |
| 146 | char *device = NULL; | 149 | int errorcode; |
| 147 | int o; | 150 | check_ide_smart_config config; |
| 148 | int longindex; | 151 | } check_ide_smart_config_wrapper; |
| 149 | int retval = 0; | 152 | static check_ide_smart_config_wrapper process_arguments(int argc, char **argv) { |
| 150 | |||
| 151 | thresholds_t thresholds; | ||
| 152 | values_t values; | ||
| 153 | int fd; | ||
| 154 | |||
| 155 | static struct option longopts[] = {{"device", required_argument, 0, 'd'}, | 153 | static struct option longopts[] = {{"device", required_argument, 0, 'd'}, |
| 156 | {"immediate", no_argument, 0, 'i'}, | 154 | {"immediate", no_argument, 0, 'i'}, |
| 157 | {"quiet-check", no_argument, 0, 'q'}, | 155 | {"quiet-check", no_argument, 0, 'q'}, |
| @@ -162,24 +160,22 @@ int main(int argc, char *argv[]) { | |||
| 162 | {"version", no_argument, 0, 'V'}, | 160 | {"version", no_argument, 0, 'V'}, |
| 163 | {0, 0, 0, 0}}; | 161 | {0, 0, 0, 0}}; |
| 164 | 162 | ||
| 165 | /* Parse extra opts if any */ | 163 | check_ide_smart_config_wrapper result = { |
| 166 | argv = np_extra_opts(&argc, argv, progname); | 164 | .errorcode = OK, |
| 167 | 165 | .config = check_ide_smart_init(), | |
| 168 | setlocale(LC_ALL, ""); | 166 | }; |
| 169 | bindtextdomain(PACKAGE, LOCALEDIR); | ||
| 170 | textdomain(PACKAGE); | ||
| 171 | 167 | ||
| 172 | while (true) { | 168 | while (true) { |
| 169 | int longindex = 0; | ||
| 170 | int option_index = getopt_long(argc, argv, "+d:iq10nhVv", longopts, &longindex); | ||
| 173 | 171 | ||
| 174 | o = getopt_long(argc, argv, "+d:iq10nhVv", longopts, &longindex); | 172 | if (option_index == -1 || option_index == EOF || option_index == 1) { |
| 175 | |||
| 176 | if (o == -1 || o == EOF || o == 1) { | ||
| 177 | break; | 173 | break; |
| 178 | } | 174 | } |
| 179 | 175 | ||
| 180 | switch (o) { | 176 | switch (option_index) { |
| 181 | case 'd': | 177 | case 'd': |
| 182 | device = optarg; | 178 | result.config.device = optarg; |
| 183 | break; | 179 | break; |
| 184 | case 'q': | 180 | case 'q': |
| 185 | fprintf(stderr, "%s\n", _("DEPRECATION WARNING: the -q switch (quiet output) is no longer \"quiet\".")); | 181 | fprintf(stderr, "%s\n", _("DEPRECATION WARNING: the -q switch (quiet output) is no longer \"quiet\".")); |
| @@ -189,84 +185,103 @@ int main(int argc, char *argv[]) { | |||
| 189 | case '1': | 185 | case '1': |
| 190 | case '0': | 186 | case '0': |
| 191 | printf("%s\n", _("SMART commands are broken and have been disabled (See Notes in --help).")); | 187 | printf("%s\n", _("SMART commands are broken and have been disabled (See Notes in --help).")); |
| 192 | return STATE_CRITICAL; | 188 | result.errorcode = ERROR; |
| 189 | return result; | ||
| 193 | break; | 190 | break; |
| 194 | case 'n': | 191 | case 'n': |
| 195 | fprintf(stderr, "%s\n", _("DEPRECATION WARNING: the -n switch (Nagios-compatible output) is now the")); | 192 | fprintf(stderr, "%s\n", _("DEPRECATION WARNING: the -n switch (Nagios-compatible output) is now the")); |
| 196 | fprintf(stderr, "%s\n", _("default and will be removed from future releases.")); | 193 | fprintf(stderr, "%s\n", _("default and will be removed from future releases.")); |
| 197 | break; | 194 | break; |
| 198 | case 'v': /* verbose */ | 195 | case 'v': /* verbose */ |
| 199 | verbose = true; | 196 | verbose++; |
| 200 | break; | 197 | break; |
| 201 | case 'h': | 198 | case 'h': |
| 202 | print_help(); | 199 | print_help(); |
| 203 | return STATE_UNKNOWN; | 200 | exit(STATE_UNKNOWN); |
| 204 | case 'V': | 201 | case 'V': |
| 205 | print_revision(progname, NP_VERSION); | 202 | print_revision(progname, NP_VERSION); |
| 206 | return STATE_UNKNOWN; | 203 | exit(STATE_UNKNOWN); |
| 207 | default: | 204 | default: |
| 208 | usage5(); | 205 | usage5(); |
| 209 | } | 206 | } |
| 210 | } | 207 | } |
| 211 | 208 | ||
| 212 | if (optind < argc) { | 209 | if (optind < argc) { |
| 213 | device = argv[optind]; | 210 | result.config.device = argv[optind]; |
| 214 | } | 211 | } |
| 215 | 212 | ||
| 216 | if (!device) { | 213 | if (result.config.device == NULL) { |
| 217 | print_help(); | 214 | print_help(); |
| 218 | return STATE_UNKNOWN; | 215 | exit(STATE_UNKNOWN); |
| 216 | } | ||
| 217 | |||
| 218 | return result; | ||
| 219 | } | ||
| 220 | |||
| 221 | int main(int argc, char *argv[]) { | ||
| 222 | setlocale(LC_ALL, ""); | ||
| 223 | bindtextdomain(PACKAGE, LOCALEDIR); | ||
| 224 | textdomain(PACKAGE); | ||
| 225 | |||
| 226 | /* Parse extra opts if any */ | ||
| 227 | argv = np_extra_opts(&argc, argv, progname); | ||
| 228 | |||
| 229 | check_ide_smart_config_wrapper tmp_config = process_arguments(argc, argv); | ||
| 230 | |||
| 231 | if (tmp_config.errorcode != OK) { | ||
| 232 | die(STATE_UNKNOWN, _("Failed to parse commandline")); | ||
| 219 | } | 233 | } |
| 220 | 234 | ||
| 221 | fd = open(device, OPEN_MODE); | 235 | check_ide_smart_config config = tmp_config.config; |
| 222 | 236 | ||
| 223 | if (fd < 0) { | 237 | int device_file_descriptor = open(config.device, OPEN_MODE); |
| 224 | printf(_("CRITICAL - Couldn't open device %s: %s\n"), device, strerror(errno)); | 238 | |
| 239 | if (device_file_descriptor < 0) { | ||
| 240 | printf(_("CRITICAL - Couldn't open device %s: %s\n"), config.device, strerror(errno)); | ||
| 225 | return STATE_CRITICAL; | 241 | return STATE_CRITICAL; |
| 226 | } | 242 | } |
| 227 | 243 | ||
| 228 | if (smart_cmd_simple(fd, SMART_CMD_ENABLE, 0, false)) { | 244 | if (smart_cmd_simple(device_file_descriptor, SMART_CMD_ENABLE, 0, false)) { |
| 229 | printf(_("CRITICAL - SMART_CMD_ENABLE\n")); | 245 | printf(_("CRITICAL - SMART_CMD_ENABLE\n")); |
| 230 | return STATE_CRITICAL; | 246 | return STATE_CRITICAL; |
| 231 | } | 247 | } |
| 232 | 248 | ||
| 233 | smart_read_values(fd, &values); | 249 | smart_values values; |
| 234 | smart_read_thresholds(fd, &thresholds); | 250 | smart_read_values(device_file_descriptor, &values); |
| 235 | retval = nagios(&values, &thresholds); | 251 | smart_thresholds thresholds; |
| 252 | smart_read_thresholds(device_file_descriptor, &thresholds); | ||
| 253 | mp_state_enum retval = compare_values_and_thresholds(&values, &thresholds); | ||
| 236 | if (verbose) { | 254 | if (verbose) { |
| 237 | print_values(&values, &thresholds); | 255 | print_values(&values, &thresholds); |
| 238 | } | 256 | } |
| 239 | 257 | ||
| 240 | close(fd); | 258 | close(device_file_descriptor); |
| 241 | return retval; | 259 | return retval; |
| 242 | } | 260 | } |
| 243 | 261 | ||
| 244 | char *get_offline_text(int status) { | 262 | char *get_offline_text(int status) { |
| 245 | int i; | 263 | for (int index = 0; offline_status_text[index].text; index++) { |
| 246 | for (i = 0; offline_status_text[i].text; i++) { | 264 | if (offline_status_text[index].value == status) { |
| 247 | if (offline_status_text[i].value == status) { | 265 | return offline_status_text[index].text; |
| 248 | return offline_status_text[i].text; | ||
| 249 | } | 266 | } |
| 250 | } | 267 | } |
| 251 | return "UNKNOWN"; | 268 | return "UNKNOWN"; |
| 252 | } | 269 | } |
| 253 | 270 | ||
| 254 | int smart_read_values(int fd, values_t *values) { | 271 | int smart_read_values(int file_descriptor, smart_values *values) { |
| 255 | #ifdef __linux__ | 272 | #ifdef __linux__ |
| 256 | int e; | ||
| 257 | uint8_t args[4 + 512]; | 273 | uint8_t args[4 + 512]; |
| 258 | args[0] = WIN_SMART; | 274 | args[0] = WIN_SMART; |
| 259 | args[1] = 0; | 275 | args[1] = 0; |
| 260 | args[2] = SMART_READ_VALUES; | 276 | args[2] = SMART_READ_VALUES; |
| 261 | args[3] = 1; | 277 | args[3] = 1; |
| 262 | if (ioctl(fd, HDIO_DRIVE_CMD, &args)) { | 278 | if (ioctl(file_descriptor, HDIO_DRIVE_CMD, &args)) { |
| 263 | e = errno; | 279 | int errno_storage = errno; |
| 264 | printf(_("CRITICAL - SMART_READ_VALUES: %s\n"), strerror(errno)); | 280 | printf(_("CRITICAL - SMART_READ_VALUES: %s\n"), strerror(errno)); |
| 265 | return e; | 281 | return errno_storage; |
| 266 | } | 282 | } |
| 267 | memcpy(values, args + 4, 512); | 283 | memcpy(values, args + 4, 512); |
| 268 | #endif /* __linux__ */ | 284 | #elif defined __NetBSD__ |
| 269 | #ifdef __NetBSD__ | ||
| 270 | struct atareq req; | 285 | struct atareq req; |
| 271 | unsigned char inbuf[DEV_BSIZE]; | 286 | unsigned char inbuf[DEV_BSIZE]; |
| 272 | 287 | ||
| @@ -281,34 +296,37 @@ int smart_read_values(int fd, values_t *values) { | |||
| 281 | req.datalen = sizeof(inbuf); | 296 | req.datalen = sizeof(inbuf); |
| 282 | req.cylinder = WDSMART_CYL; | 297 | req.cylinder = WDSMART_CYL; |
| 283 | 298 | ||
| 284 | if (ioctl(fd, ATAIOCCOMMAND, &req) == 0) { | 299 | if (ioctl(file_descriptor, ATAIOCCOMMAND, &req) == 0) { |
| 285 | if (req.retsts != ATACMD_OK) { | 300 | if (req.retsts != ATACMD_OK) { |
| 286 | errno = ENODEV; | 301 | errno = ENODEV; |
| 287 | } | 302 | } |
| 288 | } | 303 | } |
| 289 | 304 | ||
| 290 | if (errno != 0) { | 305 | if (errno != 0) { |
| 291 | int e = errno; | 306 | int errno_storage = errno; |
| 292 | printf(_("CRITICAL - SMART_READ_VALUES: %s\n"), strerror(errno)); | 307 | printf(_("CRITICAL - SMART_READ_VALUES: %s\n"), strerror(errno)); |
| 293 | return e; | 308 | return errno_storage; |
| 294 | } | 309 | } |
| 295 | 310 | ||
| 296 | (void)memcpy(values, inbuf, 512); | 311 | (void)memcpy(values, inbuf, 512); |
| 297 | #endif /* __NetBSD__ */ | 312 | #else // __linux__ || __NetBSD__ |
| 313 | # error Not implemented for this OS | ||
| 314 | #endif | ||
| 315 | |||
| 298 | return 0; | 316 | return 0; |
| 299 | } | 317 | } |
| 300 | 318 | ||
| 301 | int nagios(values_t *p, thresholds_t *t) { | 319 | mp_state_enum compare_values_and_thresholds(smart_values *values, smart_thresholds *thresholds) { |
| 302 | value_t *value = p->values; | 320 | smart_value *value = values->values; |
| 303 | threshold_t *threshold = t->thresholds; | 321 | smart_threshold *threshold = thresholds->thresholds; |
| 322 | |||
| 304 | int status = OPERATIONAL; | 323 | int status = OPERATIONAL; |
| 305 | int prefailure = 0; | 324 | int prefailure = 0; |
| 306 | int advisory = 0; | 325 | int advisory = 0; |
| 307 | int failed = 0; | 326 | int failed = 0; |
| 308 | int passed = 0; | 327 | int passed = 0; |
| 309 | int total = 0; | 328 | int total = 0; |
| 310 | int i; | 329 | for (int i = 0; i < NR_ATTRIBUTES; i++) { |
| 311 | for (i = 0; i < NR_ATTRIBUTES; i++) { | ||
| 312 | if (value->id && threshold->id && value->id == threshold->id) { | 330 | if (value->id && threshold->id && value->id == threshold->id) { |
| 313 | if (value->value < threshold->threshold) { | 331 | if (value->value < threshold->threshold) { |
| 314 | ++failed; | 332 | ++failed; |
| @@ -327,6 +345,7 @@ int nagios(values_t *p, thresholds_t *t) { | |||
| 327 | ++value; | 345 | ++value; |
| 328 | ++threshold; | 346 | ++threshold; |
| 329 | } | 347 | } |
| 348 | |||
| 330 | switch (status) { | 349 | switch (status) { |
| 331 | case PREFAILURE: | 350 | case PREFAILURE: |
| 332 | printf(_("CRITICAL - %d Harddrive PreFailure%cDetected! %d/%d tests failed.\n"), prefailure, prefailure > 1 ? 's' : ' ', failed, | 351 | printf(_("CRITICAL - %d Harddrive PreFailure%cDetected! %d/%d tests failed.\n"), prefailure, prefailure > 1 ? 's' : ' ', failed, |
| @@ -349,50 +368,51 @@ int nagios(values_t *p, thresholds_t *t) { | |||
| 349 | return status; | 368 | return status; |
| 350 | } | 369 | } |
| 351 | 370 | ||
| 352 | void print_value(value_t *p, threshold_t *t) { | 371 | void print_value(smart_value *value_pointer, smart_threshold *threshold_pointer) { |
| 353 | printf("Id=%3d, Status=%2d {%s , %s}, Value=%3d, Threshold=%3d, %s\n", p->id, p->status, p->status & 1 ? "PreFailure" : "Advisory ", | 372 | printf("Id=%3d, Status=%2d {%s , %s}, Value=%3d, Threshold=%3d, %s\n", value_pointer->id, value_pointer->status, |
| 354 | p->status & 2 ? "OnLine " : "OffLine", p->value, t->threshold, p->value >= t->threshold ? "Passed" : "Failed"); | 373 | value_pointer->status & 1 ? "PreFailure" : "Advisory ", value_pointer->status & 2 ? "OnLine " : "OffLine", |
| 374 | value_pointer->value, threshold_pointer->threshold, value_pointer->value >= threshold_pointer->threshold ? "Passed" : "Failed"); | ||
| 355 | } | 375 | } |
| 356 | 376 | ||
| 357 | void print_values(values_t *p, thresholds_t *t) { | 377 | void print_values(smart_values *values, smart_thresholds *thresholds) { |
| 358 | value_t *value = p->values; | 378 | smart_value *value = values->values; |
| 359 | threshold_t *threshold = t->thresholds; | 379 | smart_threshold *threshold = thresholds->thresholds; |
| 360 | int i; | 380 | for (int i = 0; i < NR_ATTRIBUTES; i++) { |
| 361 | for (i = 0; i < NR_ATTRIBUTES; i++) { | ||
| 362 | if (value->id && threshold->id && value->id == threshold->id) { | 381 | if (value->id && threshold->id && value->id == threshold->id) { |
| 363 | print_value(value++, threshold++); | 382 | print_value(value++, threshold++); |
| 364 | } | 383 | } |
| 365 | } | 384 | } |
| 366 | printf(_("OffLineStatus=%d {%s}, AutoOffLine=%s, OffLineTimeout=%d minutes\n"), p->offline_status, | 385 | printf(_("OffLineStatus=%d {%s}, AutoOffLine=%s, OffLineTimeout=%d minutes\n"), values->offline_status, |
| 367 | get_offline_text(p->offline_status & 0x7f), (p->offline_status & 0x80 ? "Yes" : "No"), p->offline_timeout / 60); | 386 | get_offline_text(values->offline_status & 0x7f), (values->offline_status & 0x80 ? "Yes" : "No"), values->offline_timeout / 60); |
| 368 | printf(_("OffLineCapability=%d {%s %s %s}\n"), p->offline_capability, p->offline_capability & 1 ? "Immediate" : "", | 387 | printf(_("OffLineCapability=%d {%s %s %s}\n"), values->offline_capability, values->offline_capability & 1 ? "Immediate" : "", |
| 369 | p->offline_capability & 2 ? "Auto" : "", p->offline_capability & 4 ? "AbortOnCmd" : "SuspendOnCmd"); | 388 | values->offline_capability & 2 ? "Auto" : "", values->offline_capability & 4 ? "AbortOnCmd" : "SuspendOnCmd"); |
| 370 | printf(_("SmartRevision=%d, CheckSum=%d, SmartCapability=%d {%s %s}\n"), p->revision, p->checksum, p->smart_capability, | 389 | printf(_("SmartRevision=%d, CheckSum=%d, SmartCapability=%d {%s %s}\n"), values->revision, values->checksum, values->smart_capability, |
| 371 | p->smart_capability & 1 ? "SaveOnStandBy" : "", p->smart_capability & 2 ? "AutoSave" : ""); | 390 | values->smart_capability & 1 ? "SaveOnStandBy" : "", values->smart_capability & 2 ? "AutoSave" : ""); |
| 372 | } | 391 | } |
| 373 | 392 | ||
| 374 | int smart_cmd_simple(int fd, enum SmartCommand command, uint8_t val0, bool show_error) { | 393 | mp_state_enum smart_cmd_simple(int file_descriptor, enum SmartCommand command, uint8_t val0, bool show_error) { |
| 375 | int e = STATE_UNKNOWN; | 394 | mp_state_enum result = STATE_UNKNOWN; |
| 376 | #ifdef __linux__ | 395 | #ifdef __linux__ |
| 377 | uint8_t args[4]; | 396 | uint8_t args[4] = { |
| 378 | args[0] = WIN_SMART; | 397 | WIN_SMART, |
| 379 | args[1] = val0; | 398 | val0, |
| 380 | args[2] = smart_command[command].value; | 399 | smart_command[command].value, |
| 381 | args[3] = 0; | 400 | 0, |
| 382 | if (ioctl(fd, HDIO_DRIVE_CMD, &args)) { | 401 | }; |
| 383 | e = STATE_CRITICAL; | 402 | |
| 403 | if (ioctl(file_descriptor, HDIO_DRIVE_CMD, &args)) { | ||
| 404 | result = STATE_CRITICAL; | ||
| 384 | if (show_error) { | 405 | if (show_error) { |
| 385 | printf(_("CRITICAL - %s: %s\n"), smart_command[command].text, strerror(errno)); | 406 | printf(_("CRITICAL - %s: %s\n"), smart_command[command].text, strerror(errno)); |
| 386 | } | 407 | } |
| 387 | } else { | 408 | } else { |
| 388 | e = STATE_OK; | 409 | result = STATE_OK; |
| 389 | if (show_error) { | 410 | if (show_error) { |
| 390 | printf(_("OK - Command sent (%s)\n"), smart_command[command].text); | 411 | printf(_("OK - Command sent (%s)\n"), smart_command[command].text); |
| 391 | } | 412 | } |
| 392 | } | 413 | } |
| 393 | 414 | ||
| 394 | #endif /* __linux__ */ | 415 | #elif defined __NetBSD__ |
| 395 | #ifdef __NetBSD__ | ||
| 396 | struct atareq req; | 416 | struct atareq req; |
| 397 | 417 | ||
| 398 | memset(&req, 0, sizeof(req)); | 418 | memset(&req, 0, sizeof(req)); |
| @@ -403,7 +423,7 @@ int smart_cmd_simple(int fd, enum SmartCommand command, uint8_t val0, bool show_ | |||
| 403 | req.cylinder = WDSMART_CYL; | 423 | req.cylinder = WDSMART_CYL; |
| 404 | req.sec_count = val0; | 424 | req.sec_count = val0; |
| 405 | 425 | ||
| 406 | if (ioctl(fd, ATAIOCCOMMAND, &req) == 0) { | 426 | if (ioctl(file_descriptor, ATAIOCCOMMAND, &req) == 0) { |
| 407 | if (req.retsts != ATACMD_OK) { | 427 | if (req.retsts != ATACMD_OK) { |
| 408 | errno = ENODEV; | 428 | errno = ENODEV; |
| 409 | } | 429 | } |
| @@ -413,42 +433,42 @@ int smart_cmd_simple(int fd, enum SmartCommand command, uint8_t val0, bool show_ | |||
| 413 | } | 433 | } |
| 414 | 434 | ||
| 415 | if (errno != 0) { | 435 | if (errno != 0) { |
| 416 | e = STATE_CRITICAL; | 436 | result = STATE_CRITICAL; |
| 417 | if (show_error) { | 437 | if (show_error) { |
| 418 | printf(_("CRITICAL - %s: %s\n"), smart_command[command].text, strerror(errno)); | 438 | printf(_("CRITICAL - %s: %s\n"), smart_command[command].text, strerror(errno)); |
| 419 | } | 439 | } |
| 420 | } else { | 440 | } else { |
| 421 | e = STATE_OK; | 441 | result = STATE_OK; |
| 422 | if (show_error) { | 442 | if (show_error) { |
| 423 | printf(_("OK - Command sent (%s)\n"), smart_command[command].text); | 443 | printf(_("OK - Command sent (%s)\n"), smart_command[command].text); |
| 424 | } | 444 | } |
| 425 | } | 445 | } |
| 426 | 446 | #else | |
| 447 | # error Not implemented for this OS | ||
| 427 | #endif /* __NetBSD__ */ | 448 | #endif /* __NetBSD__ */ |
| 428 | return e; | 449 | |
| 450 | return result; | ||
| 429 | } | 451 | } |
| 430 | 452 | ||
| 431 | int smart_read_thresholds(int fd, thresholds_t *thresholds) { | 453 | int smart_read_thresholds(int file_descriptor, smart_thresholds *thresholds) { |
| 432 | #ifdef __linux__ | 454 | #ifdef __linux__ |
| 433 | int e; | ||
| 434 | uint8_t args[4 + 512]; | 455 | uint8_t args[4 + 512]; |
| 435 | args[0] = WIN_SMART; | 456 | args[0] = WIN_SMART; |
| 436 | args[1] = 0; | 457 | args[1] = 0; |
| 437 | args[2] = SMART_READ_THRESHOLDS; | 458 | args[2] = SMART_READ_THRESHOLDS; |
| 438 | args[3] = 1; | 459 | args[3] = 1; |
| 439 | if (ioctl(fd, HDIO_DRIVE_CMD, &args)) { | 460 | if (ioctl(file_descriptor, HDIO_DRIVE_CMD, &args)) { |
| 440 | e = errno; | 461 | int errno_storage = errno; |
| 441 | printf(_("CRITICAL - SMART_READ_THRESHOLDS: %s\n"), strerror(errno)); | 462 | printf(_("CRITICAL - SMART_READ_THRESHOLDS: %s\n"), strerror(errno)); |
| 442 | return e; | 463 | return errno_storage; |
| 443 | } | 464 | } |
| 444 | memcpy(thresholds, args + 4, 512); | 465 | memcpy(thresholds, args + 4, 512); |
| 445 | #endif /* __linux__ */ | 466 | #elif defined __NetBSD__ |
| 446 | #ifdef __NetBSD__ | ||
| 447 | struct atareq req; | 467 | struct atareq req; |
| 448 | unsigned char inbuf[DEV_BSIZE]; | ||
| 449 | |||
| 450 | memset(&req, 0, sizeof(req)); | 468 | memset(&req, 0, sizeof(req)); |
| 451 | req.timeout = 1000; | 469 | req.timeout = 1000; |
| 470 | |||
| 471 | unsigned char inbuf[DEV_BSIZE]; | ||
| 452 | memset(&inbuf, 0, sizeof(inbuf)); | 472 | memset(&inbuf, 0, sizeof(inbuf)); |
| 453 | 473 | ||
| 454 | req.flags = ATACMD_READ; | 474 | req.flags = ATACMD_READ; |
| @@ -458,20 +478,23 @@ int smart_read_thresholds(int fd, thresholds_t *thresholds) { | |||
| 458 | req.datalen = sizeof(inbuf); | 478 | req.datalen = sizeof(inbuf); |
| 459 | req.cylinder = WDSMART_CYL; | 479 | req.cylinder = WDSMART_CYL; |
| 460 | 480 | ||
| 461 | if (ioctl(fd, ATAIOCCOMMAND, &req) == 0) { | 481 | if (ioctl(file_descriptor, ATAIOCCOMMAND, &req) == 0) { |
| 462 | if (req.retsts != ATACMD_OK) { | 482 | if (req.retsts != ATACMD_OK) { |
| 463 | errno = ENODEV; | 483 | errno = ENODEV; |
| 464 | } | 484 | } |
| 465 | } | 485 | } |
| 466 | 486 | ||
| 467 | if (errno != 0) { | 487 | if (errno != 0) { |
| 468 | int e = errno; | 488 | int errno_storage = errno; |
| 469 | printf(_("CRITICAL - SMART_READ_THRESHOLDS: %s\n"), strerror(errno)); | 489 | printf(_("CRITICAL - SMART_READ_THRESHOLDS: %s\n"), strerror(errno)); |
| 470 | return e; | 490 | return errno_storage; |
| 471 | } | 491 | } |
| 472 | 492 | ||
| 473 | (void)memcpy(thresholds, inbuf, 512); | 493 | (void)memcpy(thresholds, inbuf, 512); |
| 494 | #else | ||
| 495 | # error Not implemented for this OS | ||
| 474 | #endif /* __NetBSD__ */ | 496 | #endif /* __NetBSD__ */ |
| 497 | |||
| 475 | return 0; | 498 | return 0; |
| 476 | } | 499 | } |
| 477 | 500 | ||
diff --git a/plugins/check_ide_smart.d/config.h b/plugins/check_ide_smart.d/config.h new file mode 100644 index 00000000..36899abe --- /dev/null +++ b/plugins/check_ide_smart.d/config.h | |||
| @@ -0,0 +1,15 @@ | |||
| 1 | #pragma once | ||
| 2 | |||
| 3 | #include "../../config.h" | ||
| 4 | #include <stddef.h> | ||
| 5 | |||
| 6 | typedef struct { | ||
| 7 | char *device; | ||
| 8 | } check_ide_smart_config; | ||
| 9 | |||
| 10 | check_ide_smart_config check_ide_smart_init() { | ||
| 11 | check_ide_smart_config tmp = { | ||
| 12 | .device = NULL, | ||
| 13 | }; | ||
| 14 | return tmp; | ||
| 15 | } | ||
diff --git a/plugins/check_radius.c b/plugins/check_radius.c index d26f7cf3..93352bcc 100644 --- a/plugins/check_radius.c +++ b/plugins/check_radius.c | |||
| @@ -28,6 +28,7 @@ | |||
| 28 | * | 28 | * |
| 29 | *****************************************************************************/ | 29 | *****************************************************************************/ |
| 30 | 30 | ||
| 31 | #include "output.h" | ||
| 31 | const char *progname = "check_radius"; | 32 | const char *progname = "check_radius"; |
| 32 | const char *copyright = "2000-2024"; | 33 | const char *copyright = "2000-2024"; |
| 33 | const char *email = "devel@monitoring-plugins.org"; | 34 | const char *email = "devel@monitoring-plugins.org"; |
| @@ -158,49 +159,80 @@ int main(int argc, char **argv) { | |||
| 158 | 159 | ||
| 159 | check_radius_config config = tmp_config.config; | 160 | check_radius_config config = tmp_config.config; |
| 160 | 161 | ||
| 162 | if (config.output_format_is_set) { | ||
| 163 | mp_set_format(config.output_format); | ||
| 164 | } | ||
| 165 | |||
| 161 | #if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG) || \ | 166 | #if defined(HAVE_LIBFREERADIUS_CLIENT) || defined(HAVE_LIBRADIUSCLIENT_NG) || \ |
| 162 | defined(HAVE_LIBRADCLI) | 167 | defined(HAVE_LIBRADCLI) |
| 163 | rc_handle *rch = NULL; | 168 | rc_handle *rch = NULL; |
| 164 | #endif | 169 | #endif |
| 165 | 170 | ||
| 171 | mp_check overall = mp_check_init(); | ||
| 172 | mp_subcheck sc_read_config = mp_subcheck_init(); | ||
| 173 | |||
| 166 | char *str = strdup("dictionary"); | 174 | char *str = strdup("dictionary"); |
| 167 | if ((config.config_file && my_rc_read_config(config.config_file, &rch)) || | 175 | if ((config.config_file && my_rc_read_config(config.config_file, &rch)) || |
| 168 | my_rc_read_dictionary(my_rc_conf_str(str))) { | 176 | my_rc_read_dictionary(my_rc_conf_str(str))) { |
| 169 | die(STATE_UNKNOWN, _("Config file error\n")); | 177 | sc_read_config = mp_set_subcheck_state(sc_read_config, STATE_UNKNOWN); |
| 178 | xasprintf(&sc_read_config.output, "failed to read config file"); | ||
| 179 | mp_add_subcheck_to_check(&overall, sc_read_config); | ||
| 180 | mp_exit(overall); | ||
| 170 | } | 181 | } |
| 171 | 182 | ||
| 183 | sc_read_config = mp_set_subcheck_state(sc_read_config, STATE_OK); | ||
| 184 | xasprintf(&sc_read_config.output, "read config file successfully"); | ||
| 185 | mp_add_subcheck_to_check(&overall, sc_read_config); | ||
| 186 | |||
| 172 | uint32_t service = PW_AUTHENTICATE_ONLY; | 187 | uint32_t service = PW_AUTHENTICATE_ONLY; |
| 173 | 188 | ||
| 189 | mp_subcheck sc_configuring = mp_subcheck_init(); | ||
| 174 | SEND_DATA data; | 190 | SEND_DATA data; |
| 175 | memset(&data, 0, sizeof(data)); | 191 | memset(&data, 0, sizeof(data)); |
| 176 | if (!(my_rc_avpair_add(&data.send_pairs, PW_SERVICE_TYPE, &service, 0) && | 192 | if (!(my_rc_avpair_add(&data.send_pairs, PW_SERVICE_TYPE, &service, 0) && |
| 177 | my_rc_avpair_add(&data.send_pairs, PW_USER_NAME, config.username, 0) && | 193 | my_rc_avpair_add(&data.send_pairs, PW_USER_NAME, config.username, 0) && |
| 178 | my_rc_avpair_add(&data.send_pairs, PW_USER_PASSWORD, config.password, 0))) { | 194 | my_rc_avpair_add(&data.send_pairs, PW_USER_PASSWORD, config.password, 0))) { |
| 179 | die(STATE_UNKNOWN, _("Out of Memory?\n")); | 195 | xasprintf(&sc_configuring.output, "Failed to the radius options: Out of Memory?"); |
| 196 | sc_configuring = mp_set_subcheck_state(sc_configuring, STATE_UNKNOWN); | ||
| 197 | mp_add_subcheck_to_check(&overall, sc_configuring); | ||
| 198 | mp_exit(overall); | ||
| 180 | } | 199 | } |
| 181 | 200 | ||
| 182 | if (config.nas_id != NULL) { | 201 | if (config.nas_id != NULL) { |
| 183 | if (!(my_rc_avpair_add(&data.send_pairs, PW_NAS_IDENTIFIER, config.nas_id, 0))) { | 202 | if (!(my_rc_avpair_add(&data.send_pairs, PW_NAS_IDENTIFIER, config.nas_id, 0))) { |
| 184 | die(STATE_UNKNOWN, _("Invalid NAS-Identifier\n")); | 203 | xasprintf(&sc_configuring.output, |
| 204 | "Failed to the radius options: invalid NAS identifier?"); | ||
| 205 | sc_configuring = mp_set_subcheck_state(sc_configuring, STATE_UNKNOWN); | ||
| 206 | mp_add_subcheck_to_check(&overall, sc_configuring); | ||
| 207 | mp_exit(overall); | ||
| 185 | } | 208 | } |
| 186 | } | 209 | } |
| 187 | 210 | ||
| 188 | char name[HOST_NAME_MAX]; | 211 | char name[HOST_NAME_MAX]; |
| 189 | if (config.nas_ip_address == NULL) { | 212 | if (config.nas_ip_address == NULL) { |
| 190 | if (gethostname(name, sizeof(name)) != 0) { | 213 | if (gethostname(name, sizeof(name)) != 0) { |
| 191 | die(STATE_UNKNOWN, _("gethostname() failed!\n")); | 214 | xasprintf(&sc_configuring.output, "gethostname() failed"); |
| 215 | sc_configuring = mp_set_subcheck_state(sc_configuring, STATE_UNKNOWN); | ||
| 216 | mp_add_subcheck_to_check(&overall, sc_configuring); | ||
| 217 | mp_exit(overall); | ||
| 192 | } | 218 | } |
| 193 | config.nas_ip_address = name; | 219 | config.nas_ip_address = name; |
| 194 | } | 220 | } |
| 195 | 221 | ||
| 196 | struct sockaddr_storage radius_server_socket; | 222 | struct sockaddr_storage radius_server_socket; |
| 197 | if (!dns_lookup(config.nas_ip_address, &radius_server_socket, AF_UNSPEC)) { | 223 | if (!dns_lookup(config.nas_ip_address, &radius_server_socket, AF_UNSPEC)) { |
| 198 | die(STATE_UNKNOWN, _("Invalid NAS-IP-Address\n")); | 224 | xasprintf(&sc_configuring.output, "invalid NAS IP address. Lookup failed"); |
| 225 | sc_configuring = mp_set_subcheck_state(sc_configuring, STATE_UNKNOWN); | ||
| 226 | mp_add_subcheck_to_check(&overall, sc_configuring); | ||
| 227 | mp_exit(overall); | ||
| 199 | } | 228 | } |
| 200 | 229 | ||
| 201 | uint32_t client_id = ntohl(((struct sockaddr_in *)&radius_server_socket)->sin_addr.s_addr); | 230 | uint32_t client_id = ntohl(((struct sockaddr_in *)&radius_server_socket)->sin_addr.s_addr); |
| 202 | if (my_rc_avpair_add(&(data.send_pairs), PW_NAS_IP_ADDRESS, &client_id, 0) == NULL) { | 231 | if (my_rc_avpair_add(&(data.send_pairs), PW_NAS_IP_ADDRESS, &client_id, 0) == NULL) { |
| 203 | die(STATE_UNKNOWN, _("Invalid NAS-IP-Address\n")); | 232 | xasprintf(&sc_configuring.output, "invalid NAS IP address. Setting option failed"); |
| 233 | sc_configuring = mp_set_subcheck_state(sc_configuring, STATE_UNKNOWN); | ||
| 234 | mp_add_subcheck_to_check(&overall, sc_configuring); | ||
| 235 | mp_exit(overall); | ||
| 204 | } | 236 | } |
| 205 | 237 | ||
| 206 | my_rc_buildreq(&data, PW_ACCESS_REQUEST, config.server, config.port, (int)timeout_interval, | 238 | my_rc_buildreq(&data, PW_ACCESS_REQUEST, config.server, config.port, (int)timeout_interval, |
| @@ -218,51 +250,78 @@ int main(int argc, char **argv) { | |||
| 218 | rc_avpair_free(data.receive_pairs); | 250 | rc_avpair_free(data.receive_pairs); |
| 219 | } | 251 | } |
| 220 | 252 | ||
| 253 | mp_subcheck sc_eval = mp_subcheck_init(); | ||
| 254 | |||
| 221 | if (result == TIMEOUT_RC) { | 255 | if (result == TIMEOUT_RC) { |
| 222 | printf("Timeout\n"); | 256 | xasprintf(&sc_eval.output, "timeout"); |
| 223 | exit(STATE_CRITICAL); | 257 | sc_eval = mp_set_subcheck_state(sc_eval, STATE_CRITICAL); |
| 258 | mp_add_subcheck_to_check(&overall, sc_eval); | ||
| 259 | mp_exit(overall); | ||
| 224 | } | 260 | } |
| 225 | 261 | ||
| 226 | if (result == ERROR_RC) { | 262 | if (result == ERROR_RC) { |
| 227 | printf(_("Auth Error\n")); | 263 | xasprintf(&sc_eval.output, "auth error"); |
| 228 | exit(STATE_CRITICAL); | 264 | sc_eval = mp_set_subcheck_state(sc_eval, STATE_CRITICAL); |
| 265 | mp_add_subcheck_to_check(&overall, sc_eval); | ||
| 266 | mp_exit(overall); | ||
| 229 | } | 267 | } |
| 230 | 268 | ||
| 231 | if (result == REJECT_RC) { | 269 | if (result == REJECT_RC) { |
| 232 | printf(_("Auth Failed\n")); | 270 | xasprintf(&sc_eval.output, "auth failed"); |
| 233 | exit(STATE_WARNING); | 271 | sc_eval = mp_set_subcheck_state(sc_eval, STATE_WARNING); |
| 272 | mp_add_subcheck_to_check(&overall, sc_eval); | ||
| 273 | mp_exit(overall); | ||
| 234 | } | 274 | } |
| 235 | 275 | ||
| 236 | if (result == BADRESP_RC) { | 276 | if (result == BADRESP_RC) { |
| 237 | printf(_("Bad Response\n")); | 277 | xasprintf(&sc_eval.output, "bad response"); |
| 238 | exit(STATE_WARNING); | 278 | sc_eval = mp_set_subcheck_state(sc_eval, STATE_WARNING); |
| 279 | mp_add_subcheck_to_check(&overall, sc_eval); | ||
| 280 | mp_exit(overall); | ||
| 239 | } | 281 | } |
| 240 | 282 | ||
| 241 | if (config.expect && !strstr(msg, config.expect)) { | 283 | if (config.expect && !strstr(msg, config.expect)) { |
| 242 | printf("%s\n", msg); | 284 | xasprintf(&sc_eval.output, "%s", msg); |
| 243 | exit(STATE_WARNING); | 285 | sc_eval = mp_set_subcheck_state(sc_eval, STATE_WARNING); |
| 286 | mp_add_subcheck_to_check(&overall, sc_eval); | ||
| 287 | mp_exit(overall); | ||
| 244 | } | 288 | } |
| 245 | 289 | ||
| 246 | if (result == OK_RC) { | 290 | if (result == OK_RC) { |
| 247 | printf(_("Auth OK\n")); | 291 | xasprintf(&sc_eval.output, "auth OK"); |
| 248 | exit(STATE_OK); | 292 | sc_eval = mp_set_subcheck_state(sc_eval, STATE_OK); |
| 293 | mp_add_subcheck_to_check(&overall, sc_eval); | ||
| 294 | mp_exit(overall); | ||
| 249 | } | 295 | } |
| 250 | 296 | ||
| 251 | (void)snprintf(msg, sizeof(msg), _("Unexpected result code %d"), result); | 297 | xasprintf(&sc_eval.output, "unexpected result code: %d", result); |
| 252 | printf("%s\n", msg); | 298 | sc_eval = mp_set_subcheck_state(sc_eval, STATE_UNKNOWN); |
| 253 | exit(STATE_UNKNOWN); | 299 | mp_add_subcheck_to_check(&overall, sc_eval); |
| 300 | |||
| 301 | mp_exit(overall); | ||
| 254 | } | 302 | } |
| 255 | 303 | ||
| 256 | /* process command-line arguments */ | 304 | /* process command-line arguments */ |
| 257 | check_radius_config_wrapper process_arguments(int argc, char **argv) { | 305 | check_radius_config_wrapper process_arguments(int argc, char **argv) { |
| 258 | static struct option longopts[] = { | 306 | enum { |
| 259 | {"hostname", required_argument, 0, 'H'}, {"port", required_argument, 0, 'P'}, | 307 | output_format_index |
| 260 | {"username", required_argument, 0, 'u'}, {"password", required_argument, 0, 'p'}, | 308 | }; |
| 261 | {"nas-id", required_argument, 0, 'n'}, {"nas-ip-address", required_argument, 0, 'N'}, | 309 | |
| 262 | {"filename", required_argument, 0, 'F'}, {"expect", required_argument, 0, 'e'}, | 310 | static struct option longopts[] = {{"hostname", required_argument, 0, 'H'}, |
| 263 | {"retries", required_argument, 0, 'r'}, {"timeout", required_argument, 0, 't'}, | 311 | {"port", required_argument, 0, 'P'}, |
| 264 | {"verbose", no_argument, 0, 'v'}, {"version", no_argument, 0, 'V'}, | 312 | {"username", required_argument, 0, 'u'}, |
| 265 | {"help", no_argument, 0, 'h'}, {0, 0, 0, 0}}; | 313 | {"password", required_argument, 0, 'p'}, |
| 314 | {"nas-id", required_argument, 0, 'n'}, | ||
| 315 | {"nas-ip-address", required_argument, 0, 'N'}, | ||
| 316 | {"filename", required_argument, 0, 'F'}, | ||
| 317 | {"expect", required_argument, 0, 'e'}, | ||
| 318 | {"retries", required_argument, 0, 'r'}, | ||
| 319 | {"timeout", required_argument, 0, 't'}, | ||
| 320 | {"verbose", no_argument, 0, 'v'}, | ||
| 321 | {"version", no_argument, 0, 'V'}, | ||
| 322 | {"help", no_argument, 0, 'h'}, | ||
| 323 | {"output-format", required_argument, 0, output_format_index}, | ||
| 324 | {0, 0, 0, 0}}; | ||
| 266 | 325 | ||
| 267 | check_radius_config_wrapper result = { | 326 | check_radius_config_wrapper result = { |
| 268 | .errorcode = OK, | 327 | .errorcode = OK, |
| @@ -340,6 +399,18 @@ check_radius_config_wrapper process_arguments(int argc, char **argv) { | |||
| 340 | usage2(_("Timeout interval must be a positive integer"), optarg); | 399 | usage2(_("Timeout interval must be a positive integer"), optarg); |
| 341 | } | 400 | } |
| 342 | break; | 401 | break; |
| 402 | case output_format_index: { | ||
| 403 | parsed_output_format parser = mp_parse_output_format(optarg); | ||
| 404 | if (!parser.parsing_success) { | ||
| 405 | // TODO List all available formats here, maybe add anothoer usage function | ||
| 406 | printf("Invalid output format: %s\n", optarg); | ||
| 407 | exit(STATE_UNKNOWN); | ||
| 408 | } | ||
| 409 | |||
| 410 | result.config.output_format_is_set = true; | ||
| 411 | result.config.output_format = parser.output_format; | ||
| 412 | break; | ||
| 413 | } | ||
| 343 | } | 414 | } |
| 344 | } | 415 | } |
| 345 | 416 | ||
| @@ -393,6 +464,7 @@ void print_help(void) { | |||
| 393 | printf(" %s\n", _("Response string to expect from the server")); | 464 | printf(" %s\n", _("Response string to expect from the server")); |
| 394 | printf(" %s\n", "-r, --retries=INTEGER"); | 465 | printf(" %s\n", "-r, --retries=INTEGER"); |
| 395 | printf(" %s\n", _("Number of times to retry a failed connection")); | 466 | printf(" %s\n", _("Number of times to retry a failed connection")); |
| 467 | printf(UT_OUTPUT_FORMAT); | ||
| 396 | 468 | ||
| 397 | printf(UT_CONN_TIMEOUT, timeout_interval); | 469 | printf(UT_CONN_TIMEOUT, timeout_interval); |
| 398 | 470 | ||
diff --git a/plugins/check_radius.d/config.h b/plugins/check_radius.d/config.h index b27d31e7..656bf98e 100644 --- a/plugins/check_radius.d/config.h +++ b/plugins/check_radius.d/config.h | |||
| @@ -1,6 +1,7 @@ | |||
| 1 | #pragma once | 1 | #pragma once |
| 2 | 2 | ||
| 3 | #include "../../config.h" | 3 | #include "../../config.h" |
| 4 | #include "output.h" | ||
| 4 | #include <stddef.h> | 5 | #include <stddef.h> |
| 5 | #if defined(HAVE_LIBRADCLI) | 6 | #if defined(HAVE_LIBRADCLI) |
| 6 | # include <radcli/radcli.h> | 7 | # include <radcli/radcli.h> |
| @@ -23,6 +24,9 @@ typedef struct { | |||
| 23 | unsigned short port; | 24 | unsigned short port; |
| 24 | 25 | ||
| 25 | char *expect; | 26 | char *expect; |
| 27 | |||
| 28 | bool output_format_is_set; | ||
| 29 | mp_output_format output_format; | ||
| 26 | } check_radius_config; | 30 | } check_radius_config; |
| 27 | 31 | ||
| 28 | check_radius_config check_radius_config_init() { | 32 | check_radius_config check_radius_config_init() { |
| @@ -37,6 +41,8 @@ check_radius_config check_radius_config_init() { | |||
| 37 | .port = PW_AUTH_UDP_PORT, | 41 | .port = PW_AUTH_UDP_PORT, |
| 38 | 42 | ||
| 39 | .expect = NULL, | 43 | .expect = NULL, |
| 44 | |||
| 45 | .output_format_is_set = false, | ||
| 40 | }; | 46 | }; |
| 41 | return tmp; | 47 | return tmp; |
| 42 | } | 48 | } |
diff --git a/plugins/check_real.c b/plugins/check_real.c index 66d07f8f..15c8a20c 100644 --- a/plugins/check_real.c +++ b/plugins/check_real.c | |||
| @@ -28,19 +28,21 @@ | |||
| 28 | * | 28 | * |
| 29 | *****************************************************************************/ | 29 | *****************************************************************************/ |
| 30 | 30 | ||
| 31 | #include "output.h" | ||
| 32 | #include "perfdata.h" | ||
| 31 | #include "states.h" | 33 | #include "states.h" |
| 32 | #include <stdio.h> | 34 | #include <stdio.h> |
| 33 | const char *progname = "check_real"; | ||
| 34 | const char *copyright = "2000-2024"; | ||
| 35 | const char *email = "devel@monitoring-plugins.org"; | ||
| 36 | |||
| 37 | #include "common.h" | 35 | #include "common.h" |
| 38 | #include "netutils.h" | 36 | #include "netutils.h" |
| 37 | #include "thresholds.h" | ||
| 39 | #include "utils.h" | 38 | #include "utils.h" |
| 40 | #include "check_real.d/config.h" | 39 | #include "check_real.d/config.h" |
| 41 | 40 | ||
| 42 | #define EXPECT "RTSP/1." | 41 | const char *progname = "check_real"; |
| 43 | #define URL "" | 42 | const char *copyright = "2000-2024"; |
| 43 | const char *email = "devel@monitoring-plugins.org"; | ||
| 44 | |||
| 45 | #define URL "" | ||
| 44 | 46 | ||
| 45 | typedef struct { | 47 | typedef struct { |
| 46 | int errorcode; | 48 | int errorcode; |
| @@ -68,42 +70,68 @@ int main(int argc, char **argv) { | |||
| 68 | 70 | ||
| 69 | const check_real_config config = tmp_config.config; | 71 | const check_real_config config = tmp_config.config; |
| 70 | 72 | ||
| 73 | if (config.output_format_is_set) { | ||
| 74 | mp_set_format(config.output_format); | ||
| 75 | } | ||
| 76 | |||
| 71 | /* initialize alarm signal handling */ | 77 | /* initialize alarm signal handling */ |
| 72 | signal(SIGALRM, socket_timeout_alarm_handler); | 78 | signal(SIGALRM, socket_timeout_alarm_handler); |
| 73 | 79 | ||
| 74 | /* set socket timeout */ | 80 | /* set socket timeout */ |
| 75 | alarm(socket_timeout); | 81 | alarm(socket_timeout); |
| 82 | time_t start_time; | ||
| 76 | time(&start_time); | 83 | time(&start_time); |
| 77 | 84 | ||
| 85 | mp_check overall = mp_check_init(); | ||
| 86 | mp_subcheck sc_connect = mp_subcheck_init(); | ||
| 87 | |||
| 78 | /* try to connect to the host at the given port number */ | 88 | /* try to connect to the host at the given port number */ |
| 79 | int socket; | 89 | int socket; |
| 80 | if (my_tcp_connect(config.server_address, config.server_port, &socket) != STATE_OK) { | 90 | if (my_tcp_connect(config.server_address, config.server_port, &socket) != STATE_OK) { |
| 81 | die(STATE_CRITICAL, _("Unable to connect to %s on port %d\n"), config.server_address, | 91 | xasprintf(&sc_connect.output, _("unable to connect to %s on port %d"), |
| 82 | config.server_port); | 92 | config.server_address, config.server_port); |
| 93 | sc_connect = mp_set_subcheck_state(sc_connect, STATE_CRITICAL); | ||
| 94 | mp_add_subcheck_to_check(&overall, sc_connect); | ||
| 95 | mp_exit(overall); | ||
| 83 | } | 96 | } |
| 84 | 97 | ||
| 98 | xasprintf(&sc_connect.output, _("connected to %s on port %d"), config.server_address, | ||
| 99 | config.server_port); | ||
| 100 | sc_connect = mp_set_subcheck_state(sc_connect, STATE_OK); | ||
| 101 | mp_add_subcheck_to_check(&overall, sc_connect); | ||
| 102 | |||
| 85 | /* Part I - Server Check */ | 103 | /* Part I - Server Check */ |
| 104 | mp_subcheck sc_send = mp_subcheck_init(); | ||
| 86 | 105 | ||
| 87 | /* send the OPTIONS request */ | 106 | /* send the OPTIONS request */ |
| 88 | char buffer[MAX_INPUT_BUFFER]; | 107 | char buffer[MAX_INPUT_BUFFER]; |
| 89 | sprintf(buffer, "OPTIONS rtsp://%s:%d RTSP/1.0\r\n", config.host_name, config.server_port); | 108 | sprintf(buffer, "OPTIONS rtsp://%s:%d RTSP/1.0\r\n", config.host_name, config.server_port); |
| 90 | ssize_t sent_bytes = send(socket, buffer, strlen(buffer), 0); | 109 | ssize_t sent_bytes = send(socket, buffer, strlen(buffer), 0); |
| 91 | if (sent_bytes == -1) { | 110 | if (sent_bytes == -1) { |
| 92 | die(STATE_CRITICAL, _("Sending options to %s failed\n"), config.host_name); | 111 | xasprintf(&sc_send.output, _("Sending options to %s failed"), config.host_name); |
| 112 | sc_send = mp_set_subcheck_state(sc_send, STATE_CRITICAL); | ||
| 113 | mp_add_subcheck_to_check(&overall, sc_send); | ||
| 114 | mp_exit(overall); | ||
| 93 | } | 115 | } |
| 94 | 116 | ||
| 95 | /* send the header sync */ | 117 | /* send the header sync */ |
| 96 | sprintf(buffer, "CSeq: 1\r\n"); | 118 | sprintf(buffer, "CSeq: 1\r\n"); |
| 97 | sent_bytes = send(socket, buffer, strlen(buffer), 0); | 119 | sent_bytes = send(socket, buffer, strlen(buffer), 0); |
| 98 | if (sent_bytes == -1) { | 120 | if (sent_bytes == -1) { |
| 99 | die(STATE_CRITICAL, _("Sending header sync to %s failed\n"), config.host_name); | 121 | xasprintf(&sc_send.output, _("Sending header sync to %s failed"), config.host_name); |
| 122 | sc_send = mp_set_subcheck_state(sc_send, STATE_CRITICAL); | ||
| 123 | mp_add_subcheck_to_check(&overall, sc_send); | ||
| 124 | mp_exit(overall); | ||
| 100 | } | 125 | } |
| 101 | 126 | ||
| 102 | /* send a newline so the server knows we're done with the request */ | 127 | /* send a newline so the server knows we're done with the request */ |
| 103 | sprintf(buffer, "\r\n"); | 128 | sprintf(buffer, "\r\n"); |
| 104 | sent_bytes = send(socket, buffer, strlen(buffer), 0); | 129 | sent_bytes = send(socket, buffer, strlen(buffer), 0); |
| 105 | if (sent_bytes == -1) { | 130 | if (sent_bytes == -1) { |
| 106 | die(STATE_CRITICAL, _("Sending newline to %s failed\n"), config.host_name); | 131 | xasprintf(&sc_send.output, _("Sending newline to %s failed"), config.host_name); |
| 132 | sc_send = mp_set_subcheck_state(sc_send, STATE_CRITICAL); | ||
| 133 | mp_add_subcheck_to_check(&overall, sc_send); | ||
| 134 | mp_exit(overall); | ||
| 107 | } | 135 | } |
| 108 | 136 | ||
| 109 | /* watch for the REAL connection string */ | 137 | /* watch for the REAL connection string */ |
| @@ -111,60 +139,75 @@ int main(int argc, char **argv) { | |||
| 111 | 139 | ||
| 112 | /* return a CRITICAL status if we couldn't read any data */ | 140 | /* return a CRITICAL status if we couldn't read any data */ |
| 113 | if (received_bytes == -1) { | 141 | if (received_bytes == -1) { |
| 114 | die(STATE_CRITICAL, _("No data received from %s\n"), config.host_name); | 142 | xasprintf(&sc_send.output, _("No data received from %s"), config.host_name); |
| 143 | sc_send = mp_set_subcheck_state(sc_send, STATE_CRITICAL); | ||
| 144 | mp_add_subcheck_to_check(&overall, sc_send); | ||
| 145 | mp_exit(overall); | ||
| 115 | } | 146 | } |
| 116 | 147 | ||
| 117 | mp_state_enum result = STATE_OK; | 148 | time_t end_time; |
| 118 | char *status_line = NULL; | 149 | { |
| 119 | /* make sure we find the response we are looking for */ | 150 | mp_subcheck sc_options_request = mp_subcheck_init(); |
| 120 | if (!strstr(buffer, config.server_expect)) { | 151 | mp_state_enum options_result = STATE_OK; |
| 121 | if (config.server_port == PORT) { | 152 | /* make sure we find the response we are looking for */ |
| 122 | printf("%s\n", _("Invalid REAL response received from host")); | 153 | if (!strstr(buffer, config.server_expect)) { |
| 154 | if (config.server_port == PORT) { | ||
| 155 | xasprintf(&sc_options_request.output, "invalid REAL response received from host"); | ||
| 156 | } else { | ||
| 157 | xasprintf(&sc_options_request.output, | ||
| 158 | "invalid REAL response received from host on port %d", | ||
| 159 | config.server_port); | ||
| 160 | } | ||
| 123 | } else { | 161 | } else { |
| 124 | printf(_("Invalid REAL response received from host on port %d\n"), config.server_port); | 162 | /* else we got the REAL string, so check the return code */ |
| 125 | } | 163 | time(&end_time); |
| 126 | } else { | ||
| 127 | /* else we got the REAL string, so check the return code */ | ||
| 128 | 164 | ||
| 129 | time(&end_time); | 165 | options_result = STATE_OK; |
| 130 | 166 | ||
| 131 | result = STATE_OK; | 167 | char *status_line = strtok(buffer, "\n"); |
| 168 | xasprintf(&sc_options_request.output, "status line: %s", status_line); | ||
| 132 | 169 | ||
| 133 | status_line = strtok(buffer, "\n"); | 170 | if (strstr(status_line, "200")) { |
| 134 | 171 | options_result = STATE_OK; | |
| 135 | if (strstr(status_line, "200")) { | 172 | } |
| 136 | result = STATE_OK; | 173 | /* client errors options_result in a warning state */ |
| 174 | else if (strstr(status_line, "400")) { | ||
| 175 | options_result = STATE_WARNING; | ||
| 176 | } else if (strstr(status_line, "401")) { | ||
| 177 | options_result = STATE_WARNING; | ||
| 178 | } else if (strstr(status_line, "402")) { | ||
| 179 | options_result = STATE_WARNING; | ||
| 180 | } else if (strstr(status_line, "403")) { | ||
| 181 | options_result = STATE_WARNING; | ||
| 182 | } else if (strstr(status_line, "404")) { | ||
| 183 | options_result = STATE_WARNING; | ||
| 184 | } else if (strstr(status_line, "500")) { | ||
| 185 | /* server errors options_result in a critical state */ | ||
| 186 | options_result = STATE_CRITICAL; | ||
| 187 | } else if (strstr(status_line, "501")) { | ||
| 188 | options_result = STATE_CRITICAL; | ||
| 189 | } else if (strstr(status_line, "502")) { | ||
| 190 | options_result = STATE_CRITICAL; | ||
| 191 | } else if (strstr(status_line, "503")) { | ||
| 192 | options_result = STATE_CRITICAL; | ||
| 193 | } else { | ||
| 194 | options_result = STATE_UNKNOWN; | ||
| 195 | } | ||
| 137 | } | 196 | } |
| 138 | 197 | ||
| 139 | /* client errors result in a warning state */ | 198 | sc_options_request = mp_set_subcheck_state(sc_options_request, options_result); |
| 140 | else if (strstr(status_line, "400")) { | 199 | mp_add_subcheck_to_check(&overall, sc_options_request); |
| 141 | result = STATE_WARNING; | 200 | |
| 142 | } else if (strstr(status_line, "401")) { | 201 | if (options_result != STATE_OK) { |
| 143 | result = STATE_WARNING; | 202 | // exit here if Setting options already failed |
| 144 | } else if (strstr(status_line, "402")) { | 203 | mp_exit(overall); |
| 145 | result = STATE_WARNING; | ||
| 146 | } else if (strstr(status_line, "403")) { | ||
| 147 | result = STATE_WARNING; | ||
| 148 | } else if (strstr(status_line, "404")) { | ||
| 149 | result = STATE_WARNING; | ||
| 150 | } else if (strstr(status_line, "500")) { | ||
| 151 | /* server errors result in a critical state */ | ||
| 152 | result = STATE_CRITICAL; | ||
| 153 | } else if (strstr(status_line, "501")) { | ||
| 154 | result = STATE_CRITICAL; | ||
| 155 | } else if (strstr(status_line, "502")) { | ||
| 156 | result = STATE_CRITICAL; | ||
| 157 | } else if (strstr(status_line, "503")) { | ||
| 158 | result = STATE_CRITICAL; | ||
| 159 | } else { | ||
| 160 | result = STATE_UNKNOWN; | ||
| 161 | } | 204 | } |
| 162 | } | 205 | } |
| 163 | 206 | ||
| 164 | /* Part II - Check stream exists and is ok */ | 207 | /* Part II - Check stream exists and is ok */ |
| 165 | if ((result == STATE_OK) && (config.server_url != NULL)) { | 208 | if (config.server_url != NULL) { |
| 166 | |||
| 167 | /* Part I - Server Check */ | 209 | /* Part I - Server Check */ |
| 210 | mp_subcheck sc_describe = mp_subcheck_init(); | ||
| 168 | 211 | ||
| 169 | /* send the DESCRIBE request */ | 212 | /* send the DESCRIBE request */ |
| 170 | sprintf(buffer, "DESCRIBE rtsp://%s:%d%s RTSP/1.0\r\n", config.host_name, | 213 | sprintf(buffer, "DESCRIBE rtsp://%s:%d%s RTSP/1.0\r\n", config.host_name, |
| @@ -172,98 +215,115 @@ int main(int argc, char **argv) { | |||
| 172 | 215 | ||
| 173 | ssize_t sent_bytes = send(socket, buffer, strlen(buffer), 0); | 216 | ssize_t sent_bytes = send(socket, buffer, strlen(buffer), 0); |
| 174 | if (sent_bytes == -1) { | 217 | if (sent_bytes == -1) { |
| 175 | die(STATE_CRITICAL, _("Sending DESCRIBE request to %s failed\n"), config.host_name); | 218 | sc_describe = mp_set_subcheck_state(sc_describe, STATE_CRITICAL); |
| 219 | xasprintf(&sc_describe.output, "sending DESCRIBE request to %s failed", | ||
| 220 | config.host_name); | ||
| 221 | mp_add_subcheck_to_check(&overall, sc_describe); | ||
| 222 | mp_exit(overall); | ||
| 176 | } | 223 | } |
| 177 | 224 | ||
| 178 | /* send the header sync */ | 225 | /* send the header sync */ |
| 179 | sprintf(buffer, "CSeq: 2\r\n"); | 226 | sprintf(buffer, "CSeq: 2\r\n"); |
| 180 | sent_bytes = send(socket, buffer, strlen(buffer), 0); | 227 | sent_bytes = send(socket, buffer, strlen(buffer), 0); |
| 181 | if (sent_bytes == -1) { | 228 | if (sent_bytes == -1) { |
| 182 | die(STATE_CRITICAL, _("Sending DESCRIBE request to %s failed\n"), config.host_name); | 229 | sc_describe = mp_set_subcheck_state(sc_describe, STATE_CRITICAL); |
| 230 | xasprintf(&sc_describe.output, "sending DESCRIBE request to %s failed", | ||
| 231 | config.host_name); | ||
| 232 | mp_add_subcheck_to_check(&overall, sc_describe); | ||
| 233 | mp_exit(overall); | ||
| 183 | } | 234 | } |
| 184 | 235 | ||
| 185 | /* send a newline so the server knows we're done with the request */ | 236 | /* send a newline so the server knows we're done with the request */ |
| 186 | sprintf(buffer, "\r\n"); | 237 | sprintf(buffer, "\r\n"); |
| 187 | sent_bytes = send(socket, buffer, strlen(buffer), 0); | 238 | sent_bytes = send(socket, buffer, strlen(buffer), 0); |
| 188 | if (sent_bytes == -1) { | 239 | if (sent_bytes == -1) { |
| 189 | die(STATE_CRITICAL, _("Sending DESCRIBE request to %s failed\n"), config.host_name); | 240 | sc_describe = mp_set_subcheck_state(sc_describe, STATE_CRITICAL); |
| 241 | xasprintf(&sc_describe.output, "sending DESCRIBE request to %s failed", | ||
| 242 | config.host_name); | ||
| 243 | mp_add_subcheck_to_check(&overall, sc_describe); | ||
| 244 | mp_exit(overall); | ||
| 190 | } | 245 | } |
| 191 | 246 | ||
| 192 | /* watch for the REAL connection string */ | 247 | /* watch for the REAL connection string */ |
| 193 | ssize_t recv_bytes = recv(socket, buffer, MAX_INPUT_BUFFER - 1, 0); | 248 | ssize_t recv_bytes = recv(socket, buffer, MAX_INPUT_BUFFER - 1, 0); |
| 194 | if (recv_bytes == -1) { | 249 | if (recv_bytes == -1) { |
| 195 | /* return a CRITICAL status if we couldn't read any data */ | 250 | /* return a CRITICAL status if we couldn't read any data */ |
| 196 | printf(_("No data received from host\n")); | 251 | sc_describe = mp_set_subcheck_state(sc_describe, STATE_CRITICAL); |
| 197 | result = STATE_CRITICAL; | 252 | xasprintf(&sc_describe.output, "No data received from host on DESCRIBE request"); |
| 253 | mp_add_subcheck_to_check(&overall, sc_describe); | ||
| 254 | mp_exit(overall); | ||
| 198 | } else { | 255 | } else { |
| 199 | buffer[result] = '\0'; /* null terminate received buffer */ | 256 | buffer[recv_bytes] = '\0'; /* null terminate received buffer */ |
| 200 | /* make sure we find the response we are looking for */ | 257 | /* make sure we find the response we are looking for */ |
| 201 | if (!strstr(buffer, config.server_expect)) { | 258 | if (!strstr(buffer, config.server_expect)) { |
| 202 | if (config.server_port == PORT) { | 259 | if (config.server_port == PORT) { |
| 203 | printf("%s\n", _("Invalid REAL response received from host")); | 260 | xasprintf(&sc_describe.output, "invalid REAL response received from host"); |
| 204 | } else { | 261 | } else { |
| 205 | printf(_("Invalid REAL response received from host on port %d\n"), | 262 | xasprintf(&sc_describe.output, |
| 206 | config.server_port); | 263 | "invalid REAL response received from host on port %d", |
| 264 | config.server_port); | ||
| 207 | } | 265 | } |
| 208 | } else { | ||
| 209 | 266 | ||
| 267 | sc_describe = mp_set_subcheck_state(sc_describe, STATE_UNKNOWN); | ||
| 268 | mp_add_subcheck_to_check(&overall, sc_describe); | ||
| 269 | mp_exit(overall); | ||
| 270 | } else { | ||
| 210 | /* else we got the REAL string, so check the return code */ | 271 | /* else we got the REAL string, so check the return code */ |
| 211 | 272 | ||
| 212 | time(&end_time); | 273 | time(&end_time); |
| 213 | 274 | ||
| 214 | result = STATE_OK; | 275 | char *status_line = strtok(buffer, "\n"); |
| 215 | 276 | xasprintf(&sc_describe.output, "status line: %s", status_line); | |
| 216 | status_line = strtok(buffer, "\n"); | ||
| 217 | 277 | ||
| 278 | mp_state_enum describe_result; | ||
| 218 | if (strstr(status_line, "200")) { | 279 | if (strstr(status_line, "200")) { |
| 219 | result = STATE_OK; | 280 | describe_result = STATE_OK; |
| 220 | } | 281 | } |
| 221 | 282 | /* client errors describe_result in a warning state */ | |
| 222 | /* client errors result in a warning state */ | ||
| 223 | else if (strstr(status_line, "400")) { | 283 | else if (strstr(status_line, "400")) { |
| 224 | result = STATE_WARNING; | 284 | describe_result = STATE_WARNING; |
| 225 | } else if (strstr(status_line, "401")) { | 285 | } else if (strstr(status_line, "401")) { |
| 226 | result = STATE_WARNING; | 286 | describe_result = STATE_WARNING; |
| 227 | } else if (strstr(status_line, "402")) { | 287 | } else if (strstr(status_line, "402")) { |
| 228 | result = STATE_WARNING; | 288 | describe_result = STATE_WARNING; |
| 229 | } else if (strstr(status_line, "403")) { | 289 | } else if (strstr(status_line, "403")) { |
| 230 | result = STATE_WARNING; | 290 | describe_result = STATE_WARNING; |
| 231 | } else if (strstr(status_line, "404")) { | 291 | } else if (strstr(status_line, "404")) { |
| 232 | result = STATE_WARNING; | 292 | describe_result = STATE_WARNING; |
| 233 | } | 293 | } |
| 234 | 294 | /* server errors describe_result in a critical state */ | |
| 235 | /* server errors result in a critical state */ | ||
| 236 | else if (strstr(status_line, "500")) { | 295 | else if (strstr(status_line, "500")) { |
| 237 | result = STATE_CRITICAL; | 296 | describe_result = STATE_CRITICAL; |
| 238 | } else if (strstr(status_line, "501")) { | 297 | } else if (strstr(status_line, "501")) { |
| 239 | result = STATE_CRITICAL; | 298 | describe_result = STATE_CRITICAL; |
| 240 | } else if (strstr(status_line, "502")) { | 299 | } else if (strstr(status_line, "502")) { |
| 241 | result = STATE_CRITICAL; | 300 | describe_result = STATE_CRITICAL; |
| 242 | } else if (strstr(status_line, "503")) { | 301 | } else if (strstr(status_line, "503")) { |
| 243 | result = STATE_CRITICAL; | 302 | describe_result = STATE_CRITICAL; |
| 303 | } else { | ||
| 304 | describe_result = STATE_UNKNOWN; | ||
| 244 | } | 305 | } |
| 245 | 306 | ||
| 246 | else { | 307 | sc_describe = mp_set_subcheck_state(sc_describe, describe_result); |
| 247 | result = STATE_UNKNOWN; | 308 | mp_add_subcheck_to_check(&overall, sc_describe); |
| 248 | } | ||
| 249 | } | 309 | } |
| 250 | } | 310 | } |
| 251 | } | 311 | } |
| 252 | 312 | ||
| 253 | /* Return results */ | 313 | /* Return results */ |
| 254 | if (result == STATE_OK) { | 314 | mp_subcheck sc_timing = mp_subcheck_init(); |
| 255 | if (config.check_critical_time && (end_time - start_time) > config.critical_time) { | 315 | xasprintf(&sc_timing.output, "response time: %lds", end_time - start_time); |
| 256 | result = STATE_CRITICAL; | 316 | sc_timing = mp_set_subcheck_default_state(sc_timing, STATE_OK); |
| 257 | } else if (config.check_warning_time && (end_time - start_time) > config.warning_time) { | ||
| 258 | result = STATE_WARNING; | ||
| 259 | } | ||
| 260 | 317 | ||
| 261 | /* Put some HTML in here to create a dynamic link */ | 318 | mp_perfdata pd_response_time = perfdata_init(); |
| 262 | printf(_("REAL %s - %d second response time\n"), state_text(result), | 319 | pd_response_time = mp_set_pd_value(pd_response_time, (end_time - start_time)); |
| 263 | (int)(end_time - start_time)); | 320 | pd_response_time.label = "response_time"; |
| 264 | } else { | 321 | pd_response_time.uom = "s"; |
| 265 | printf("%s\n", status_line); | 322 | pd_response_time = mp_pd_set_thresholds(pd_response_time, config.time_thresholds); |
| 266 | } | 323 | mp_add_perfdata_to_subcheck(&sc_connect, pd_response_time); |
| 324 | sc_timing = mp_set_subcheck_state(sc_timing, mp_get_pd_status(pd_response_time)); | ||
| 325 | |||
| 326 | mp_add_subcheck_to_check(&overall, sc_timing); | ||
| 267 | 327 | ||
| 268 | /* close the connection */ | 328 | /* close the connection */ |
| 269 | close(socket); | 329 | close(socket); |
| @@ -271,18 +331,28 @@ int main(int argc, char **argv) { | |||
| 271 | /* reset the alarm */ | 331 | /* reset the alarm */ |
| 272 | alarm(0); | 332 | alarm(0); |
| 273 | 333 | ||
| 274 | exit(result); | 334 | mp_exit(overall); |
| 275 | } | 335 | } |
| 276 | 336 | ||
| 277 | /* process command-line arguments */ | 337 | /* process command-line arguments */ |
| 278 | check_real_config_wrapper process_arguments(int argc, char **argv) { | 338 | check_real_config_wrapper process_arguments(int argc, char **argv) { |
| 279 | static struct option longopts[] = { | 339 | enum { |
| 280 | {"hostname", required_argument, 0, 'H'}, {"IPaddress", required_argument, 0, 'I'}, | 340 | output_format_index = CHAR_MAX + 1, |
| 281 | {"expect", required_argument, 0, 'e'}, {"url", required_argument, 0, 'u'}, | 341 | }; |
| 282 | {"port", required_argument, 0, 'p'}, {"critical", required_argument, 0, 'c'}, | 342 | |
| 283 | {"warning", required_argument, 0, 'w'}, {"timeout", required_argument, 0, 't'}, | 343 | static struct option longopts[] = {{"hostname", required_argument, 0, 'H'}, |
| 284 | {"verbose", no_argument, 0, 'v'}, {"version", no_argument, 0, 'V'}, | 344 | {"IPaddress", required_argument, 0, 'I'}, |
| 285 | {"help", no_argument, 0, 'h'}, {0, 0, 0, 0}}; | 345 | {"expect", required_argument, 0, 'e'}, |
| 346 | {"url", required_argument, 0, 'u'}, | ||
| 347 | {"port", required_argument, 0, 'p'}, | ||
| 348 | {"critical", required_argument, 0, 'c'}, | ||
| 349 | {"warning", required_argument, 0, 'w'}, | ||
| 350 | {"timeout", required_argument, 0, 't'}, | ||
| 351 | {"verbose", no_argument, 0, 'v'}, | ||
| 352 | {"version", no_argument, 0, 'V'}, | ||
| 353 | {"help", no_argument, 0, 'h'}, | ||
| 354 | {"output-format", required_argument, 0, output_format_index}, | ||
| 355 | {0, 0, 0, 0}}; | ||
| 286 | 356 | ||
| 287 | check_real_config_wrapper result = { | 357 | check_real_config_wrapper result = { |
| 288 | .errorcode = OK, | 358 | .errorcode = OK, |
| @@ -337,21 +407,23 @@ check_real_config_wrapper process_arguments(int argc, char **argv) { | |||
| 337 | } | 407 | } |
| 338 | break; | 408 | break; |
| 339 | case 'w': /* warning time threshold */ | 409 | case 'w': /* warning time threshold */ |
| 340 | if (is_intnonneg(optarg)) { | 410 | { |
| 341 | result.config.warning_time = atoi(optarg); | 411 | mp_range_parsed critical_range = mp_parse_range_string(optarg); |
| 342 | result.config.check_warning_time = true; | 412 | if (critical_range.error != MP_PARSING_SUCCES) { |
| 343 | } else { | 413 | die(STATE_UNKNOWN, "failed to parse warning threshold: %s", optarg); |
| 344 | usage4(_("Warning time must be a positive integer")); | ||
| 345 | } | 414 | } |
| 346 | break; | 415 | result.config.time_thresholds = |
| 416 | mp_thresholds_set_warn(result.config.time_thresholds, critical_range.range); | ||
| 417 | } break; | ||
| 347 | case 'c': /* critical time threshold */ | 418 | case 'c': /* critical time threshold */ |
| 348 | if (is_intnonneg(optarg)) { | 419 | { |
| 349 | result.config.critical_time = atoi(optarg); | 420 | mp_range_parsed critical_range = mp_parse_range_string(optarg); |
| 350 | result.config.check_critical_time = true; | 421 | if (critical_range.error != MP_PARSING_SUCCES) { |
| 351 | } else { | 422 | die(STATE_UNKNOWN, "failed to parse critical threshold: %s", optarg); |
| 352 | usage4(_("Critical time must be a positive integer")); | ||
| 353 | } | 423 | } |
| 354 | break; | 424 | result.config.time_thresholds = |
| 425 | mp_thresholds_set_crit(result.config.time_thresholds, critical_range.range); | ||
| 426 | } break; | ||
| 355 | case 'v': /* verbose */ | 427 | case 'v': /* verbose */ |
| 356 | verbose = true; | 428 | verbose = true; |
| 357 | break; | 429 | break; |
| @@ -368,6 +440,18 @@ check_real_config_wrapper process_arguments(int argc, char **argv) { | |||
| 368 | case 'h': /* help */ | 440 | case 'h': /* help */ |
| 369 | print_help(); | 441 | print_help(); |
| 370 | exit(STATE_UNKNOWN); | 442 | exit(STATE_UNKNOWN); |
| 443 | case output_format_index: { | ||
| 444 | parsed_output_format parser = mp_parse_output_format(optarg); | ||
| 445 | if (!parser.parsing_success) { | ||
| 446 | // TODO List all available formats here, maybe add anothoer usage function | ||
| 447 | printf("Invalid output format: %s\n", optarg); | ||
| 448 | exit(STATE_UNKNOWN); | ||
| 449 | } | ||
| 450 | |||
| 451 | result.config.output_format_is_set = true; | ||
| 452 | result.config.output_format = parser.output_format; | ||
| 453 | break; | ||
| 454 | } | ||
| 371 | case '?': /* usage */ | 455 | case '?': /* usage */ |
| 372 | usage5(); | 456 | usage5(); |
| 373 | } | 457 | } |
| @@ -390,10 +474,6 @@ check_real_config_wrapper process_arguments(int argc, char **argv) { | |||
| 390 | result.config.host_name = strdup(result.config.server_address); | 474 | result.config.host_name = strdup(result.config.server_address); |
| 391 | } | 475 | } |
| 392 | 476 | ||
| 393 | if (result.config.server_expect == NULL) { | ||
| 394 | result.config.server_expect = strdup(EXPECT); | ||
| 395 | } | ||
| 396 | |||
| 397 | return result; | 477 | return result; |
| 398 | } | 478 | } |
| 399 | 479 | ||
| @@ -420,7 +500,7 @@ void print_help(void) { | |||
| 420 | printf(" %s\n", "-u, --url=STRING"); | 500 | printf(" %s\n", "-u, --url=STRING"); |
| 421 | printf(" %s\n", _("Connect to this url")); | 501 | printf(" %s\n", _("Connect to this url")); |
| 422 | printf(" %s\n", "-e, --expect=STRING"); | 502 | printf(" %s\n", "-e, --expect=STRING"); |
| 423 | printf(_("String to expect in first line of server response (default: %s)\n"), EXPECT); | 503 | printf(_("String to expect in first line of server response (default: %s)\n"), default_expect); |
| 424 | 504 | ||
| 425 | printf(UT_WARN_CRIT); | 505 | printf(UT_WARN_CRIT); |
| 426 | 506 | ||
diff --git a/plugins/check_real.d/config.h b/plugins/check_real.d/config.h index c4663cf9..2d99ad49 100644 --- a/plugins/check_real.d/config.h +++ b/plugins/check_real.d/config.h | |||
| @@ -1,12 +1,16 @@ | |||
| 1 | #pragma once | 1 | #pragma once |
| 2 | 2 | ||
| 3 | #include "../../config.h" | 3 | #include "../../config.h" |
| 4 | #include "output.h" | ||
| 5 | #include "thresholds.h" | ||
| 4 | #include <stddef.h> | 6 | #include <stddef.h> |
| 5 | 7 | ||
| 6 | enum { | 8 | enum { |
| 7 | PORT = 554 | 9 | PORT = 554 |
| 8 | }; | 10 | }; |
| 9 | 11 | ||
| 12 | const char *default_expect = "RTSP/1."; | ||
| 13 | |||
| 10 | typedef struct { | 14 | typedef struct { |
| 11 | char *server_address; | 15 | char *server_address; |
| 12 | char *host_name; | 16 | char *host_name; |
| @@ -14,10 +18,11 @@ typedef struct { | |||
| 14 | char *server_url; | 18 | char *server_url; |
| 15 | 19 | ||
| 16 | char *server_expect; | 20 | char *server_expect; |
| 17 | int warning_time; | 21 | |
| 18 | bool check_warning_time; | 22 | mp_thresholds time_thresholds; |
| 19 | int critical_time; | 23 | |
| 20 | bool check_critical_time; | 24 | bool output_format_is_set; |
| 25 | mp_output_format output_format; | ||
| 21 | } check_real_config; | 26 | } check_real_config; |
| 22 | 27 | ||
| 23 | check_real_config check_real_config_init() { | 28 | check_real_config check_real_config_init() { |
| @@ -27,11 +32,11 @@ check_real_config check_real_config_init() { | |||
| 27 | .server_port = PORT, | 32 | .server_port = PORT, |
| 28 | .server_url = NULL, | 33 | .server_url = NULL, |
| 29 | 34 | ||
| 30 | .server_expect = NULL, | 35 | .server_expect = default_expect, |
| 31 | .warning_time = 0, | 36 | |
| 32 | .check_warning_time = false, | 37 | .time_thresholds = mp_thresholds_init(), |
| 33 | .critical_time = 0, | 38 | |
| 34 | .check_critical_time = false, | 39 | .output_format_is_set = false, |
| 35 | }; | 40 | }; |
| 36 | return tmp; | 41 | return tmp; |
| 37 | } | 42 | } |
diff --git a/plugins/check_time.c b/plugins/check_time.c index fc9ba3f9..99708ad3 100644 --- a/plugins/check_time.c +++ b/plugins/check_time.c | |||
| @@ -68,6 +68,7 @@ int main(int argc, char **argv) { | |||
| 68 | 68 | ||
| 69 | /* set socket timeout */ | 69 | /* set socket timeout */ |
| 70 | alarm(socket_timeout); | 70 | alarm(socket_timeout); |
| 71 | time_t start_time; | ||
| 71 | time(&start_time); | 72 | time(&start_time); |
| 72 | 73 | ||
| 73 | int socket; | 74 | int socket; |
| @@ -113,6 +114,7 @@ int main(int argc, char **argv) { | |||
| 113 | close(socket); | 114 | close(socket); |
| 114 | 115 | ||
| 115 | /* reset the alarm */ | 116 | /* reset the alarm */ |
| 117 | time_t end_time; | ||
| 116 | time(&end_time); | 118 | time(&end_time); |
| 117 | alarm(0); | 119 | alarm(0); |
| 118 | 120 | ||
diff --git a/plugins/utils.c b/plugins/utils.c index 41fe5fcf..dc6f5a85 100644 --- a/plugins/utils.c +++ b/plugins/utils.c | |||
| @@ -40,7 +40,6 @@ extern const char *progname; | |||
| 40 | #define STRLEN 64 | 40 | #define STRLEN 64 |
| 41 | #define TXTBLK 128 | 41 | #define TXTBLK 128 |
| 42 | 42 | ||
| 43 | time_t start_time, end_time; | ||
| 44 | 43 | ||
| 45 | void usage(const char *msg) { | 44 | void usage(const char *msg) { |
| 46 | printf("%s\n", msg); | 45 | printf("%s\n", msg); |
diff --git a/plugins/utils.h b/plugins/utils.h index 1f0e021b..68ff1630 100644 --- a/plugins/utils.h +++ b/plugins/utils.h | |||
| @@ -32,8 +32,6 @@ suite of plugins. */ | |||
| 32 | void support(void); | 32 | void support(void); |
| 33 | void print_revision(const char *, const char *); | 33 | void print_revision(const char *, const char *); |
| 34 | 34 | ||
| 35 | extern time_t start_time, end_time; | ||
| 36 | |||
| 37 | /* Test input types */ | 35 | /* Test input types */ |
| 38 | 36 | ||
| 39 | bool is_integer(char *); | 37 | bool is_integer(char *); |
