diff options
Diffstat (limited to 'plugins')
| -rw-r--r-- | plugins/check_tcp.c | 556 |
1 files changed, 261 insertions, 295 deletions
diff --git a/plugins/check_tcp.c b/plugins/check_tcp.c index 01dd35eb..78dcbd43 100644 --- a/plugins/check_tcp.c +++ b/plugins/check_tcp.c | |||
| @@ -1,31 +1,31 @@ | |||
| 1 | /***************************************************************************** | 1 | /***************************************************************************** |
| 2 | * | 2 | * |
| 3 | * Monitoring check_tcp plugin | 3 | * Monitoring check_tcp plugin |
| 4 | * | 4 | * |
| 5 | * License: GPL | 5 | * License: GPL |
| 6 | * Copyright (c) 1999-2013 Monitoring Plugins Development Team | 6 | * Copyright (c) 1999-2013 Monitoring Plugins Development Team |
| 7 | * | 7 | * |
| 8 | * Description: | 8 | * Description: |
| 9 | * | 9 | * |
| 10 | * This file contains the check_tcp plugin | 10 | * This file contains the check_tcp plugin |
| 11 | * | 11 | * |
| 12 | * | 12 | * |
| 13 | * This program is free software: you can redistribute it and/or modify | 13 | * This program is free software: you can redistribute it and/or modify |
| 14 | * it under the terms of the GNU General Public License as published by | 14 | * it under the terms of the GNU General Public License as published by |
| 15 | * the Free Software Foundation, either version 3 of the License, or | 15 | * the Free Software Foundation, either version 3 of the License, or |
| 16 | * (at your option) any later version. | 16 | * (at your option) any later version. |
| 17 | * | 17 | * |
| 18 | * This program is distributed in the hope that it will be useful, | 18 | * This program is distributed in the hope that it will be useful, |
| 19 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | 19 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 20 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | 20 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| 21 | * GNU General Public License for more details. | 21 | * GNU General Public License for more details. |
| 22 | * | 22 | * |
| 23 | * You should have received a copy of the GNU General Public License | 23 | * You should have received a copy of the GNU General Public License |
| 24 | * along with this program. If not, see <http://www.gnu.org/licenses/>. | 24 | * along with this program. If not, see <http://www.gnu.org/licenses/>. |
| 25 | * | 25 | * |
| 26 | * $Id$ | 26 | * $Id$ |
| 27 | * | 27 | * |
| 28 | *****************************************************************************/ | 28 | *****************************************************************************/ |
| 29 | 29 | ||
| 30 | /* progname "check_tcp" changes depending on symlink called */ | 30 | /* progname "check_tcp" changes depending on symlink called */ |
| 31 | char *progname; | 31 | char *progname; |
| @@ -43,17 +43,17 @@ const char *email = "devel@monitoring-plugins.org"; | |||
| 43 | #ifdef HAVE_SSL | 43 | #ifdef HAVE_SSL |
| 44 | static bool check_cert = false; | 44 | static bool check_cert = false; |
| 45 | static int days_till_exp_warn, days_till_exp_crit; | 45 | static int days_till_exp_warn, days_till_exp_crit; |
| 46 | # define my_recv(buf, len) ((flags & FLAG_SSL) ? np_net_ssl_read(buf, len) : read(sd, buf, len)) | 46 | # define my_recv(buf, len) ((flags & FLAG_SSL) ? np_net_ssl_read(buf, len) : read(sd, buf, len)) |
| 47 | # define my_send(buf, len) ((flags & FLAG_SSL) ? np_net_ssl_write(buf, len) : send(sd, buf, len, 0)) | 47 | # define my_send(buf, len) ((flags & FLAG_SSL) ? np_net_ssl_write(buf, len) : send(sd, buf, len, 0)) |
| 48 | #else | 48 | #else |
| 49 | # define my_recv(buf, len) read(sd, buf, len) | 49 | # define my_recv(buf, len) read(sd, buf, len) |
| 50 | # define my_send(buf, len) send(sd, buf, len, 0) | 50 | # define my_send(buf, len) send(sd, buf, len, 0) |
| 51 | #endif | 51 | #endif |
| 52 | 52 | ||
| 53 | /* int my_recv(char *, size_t); */ | 53 | /* int my_recv(char *, size_t); */ |
| 54 | static int process_arguments (int, char **); | 54 | static int process_arguments(int, char **); |
| 55 | void print_help (void); | 55 | void print_help(void); |
| 56 | void print_usage (void); | 56 | void print_usage(void); |
| 57 | 57 | ||
| 58 | #define EXPECT server_expect[0] | 58 | #define EXPECT server_expect[0] |
| 59 | static char *SERVICE = "TCP"; | 59 | static char *SERVICE = "TCP"; |
| @@ -91,16 +91,14 @@ static char *sni = NULL; | |||
| 91 | static bool sni_specified = false; | 91 | static bool sni_specified = false; |
| 92 | #endif | 92 | #endif |
| 93 | 93 | ||
| 94 | #define FLAG_SSL 0x01 | 94 | #define FLAG_SSL 0x01 |
| 95 | #define FLAG_VERBOSE 0x02 | 95 | #define FLAG_VERBOSE 0x02 |
| 96 | #define FLAG_TIME_WARN 0x04 | 96 | #define FLAG_TIME_WARN 0x04 |
| 97 | #define FLAG_TIME_CRIT 0x08 | 97 | #define FLAG_TIME_CRIT 0x08 |
| 98 | #define FLAG_HIDE_OUTPUT 0x10 | 98 | #define FLAG_HIDE_OUTPUT 0x10 |
| 99 | static size_t flags; | 99 | static size_t flags; |
| 100 | 100 | ||
| 101 | int | 101 | int main(int argc, char **argv) { |
| 102 | main (int argc, char **argv) | ||
| 103 | { | ||
| 104 | int result = STATE_UNKNOWN; | 102 | int result = STATE_UNKNOWN; |
| 105 | char *status = NULL; | 103 | char *status = NULL; |
| 106 | struct timeval tv; | 104 | struct timeval tv; |
| @@ -110,19 +108,21 @@ main (int argc, char **argv) | |||
| 110 | 108 | ||
| 111 | FD_ZERO(&rfds); | 109 | FD_ZERO(&rfds); |
| 112 | 110 | ||
| 113 | setlocale (LC_ALL, ""); | 111 | setlocale(LC_ALL, ""); |
| 114 | bindtextdomain (PACKAGE, LOCALEDIR); | 112 | bindtextdomain(PACKAGE, LOCALEDIR); |
| 115 | textdomain (PACKAGE); | 113 | textdomain(PACKAGE); |
| 116 | 114 | ||
| 117 | /* determine program- and service-name quickly */ | 115 | /* determine program- and service-name quickly */ |
| 118 | progname = strrchr(argv[0], '/'); | 116 | progname = strrchr(argv[0], '/'); |
| 119 | if(progname != NULL) progname++; | 117 | if (progname != NULL) |
| 120 | else progname = argv[0]; | 118 | progname++; |
| 119 | else | ||
| 120 | progname = argv[0]; | ||
| 121 | 121 | ||
| 122 | size_t prog_name_len = strlen(progname); | 122 | size_t prog_name_len = strlen(progname); |
| 123 | if(prog_name_len > 6 && !memcmp(progname, "check_", 6)) { | 123 | if (prog_name_len > 6 && !memcmp(progname, "check_", 6)) { |
| 124 | SERVICE = strdup(progname + 6); | 124 | SERVICE = strdup(progname + 6); |
| 125 | for(size_t i = 0; i < prog_name_len - 6; i++) | 125 | for (size_t i = 0; i < prog_name_len - 6; i++) |
| 126 | SERVICE[i] = toupper(SERVICE[i]); | 126 | SERVICE[i] = toupper(SERVICE[i]); |
| 127 | } | 127 | } |
| 128 | 128 | ||
| @@ -133,23 +133,19 @@ main (int argc, char **argv) | |||
| 133 | /* determine defaults for this service's protocol */ | 133 | /* determine defaults for this service's protocol */ |
| 134 | if (!strncmp(SERVICE, "UDP", 3)) { | 134 | if (!strncmp(SERVICE, "UDP", 3)) { |
| 135 | PROTOCOL = IPPROTO_UDP; | 135 | PROTOCOL = IPPROTO_UDP; |
| 136 | } | 136 | } else if (!strncmp(SERVICE, "FTP", 3)) { |
| 137 | else if (!strncmp(SERVICE, "FTP", 3)) { | ||
| 138 | EXPECT = "220"; | 137 | EXPECT = "220"; |
| 139 | QUIT = "QUIT\r\n"; | 138 | QUIT = "QUIT\r\n"; |
| 140 | PORT = 21; | 139 | PORT = 21; |
| 141 | } | 140 | } else if (!strncmp(SERVICE, "POP", 3) || !strncmp(SERVICE, "POP3", 4)) { |
| 142 | else if (!strncmp(SERVICE, "POP", 3) || !strncmp(SERVICE, "POP3", 4)) { | ||
| 143 | EXPECT = "+OK"; | 141 | EXPECT = "+OK"; |
| 144 | QUIT = "QUIT\r\n"; | 142 | QUIT = "QUIT\r\n"; |
| 145 | PORT = 110; | 143 | PORT = 110; |
| 146 | } | 144 | } else if (!strncmp(SERVICE, "SMTP", 4)) { |
| 147 | else if (!strncmp(SERVICE, "SMTP", 4)) { | ||
| 148 | EXPECT = "220"; | 145 | EXPECT = "220"; |
| 149 | QUIT = "QUIT\r\n"; | 146 | QUIT = "QUIT\r\n"; |
| 150 | PORT = 25; | 147 | PORT = 25; |
| 151 | } | 148 | } else if (!strncmp(SERVICE, "IMAP", 4)) { |
| 152 | else if (!strncmp(SERVICE, "IMAP", 4)) { | ||
| 153 | EXPECT = "* OK"; | 149 | EXPECT = "* OK"; |
| 154 | QUIT = "a1 LOGOUT\r\n"; | 150 | QUIT = "a1 LOGOUT\r\n"; |
| 155 | PORT = 143; | 151 | PORT = 143; |
| @@ -160,27 +156,23 @@ main (int argc, char **argv) | |||
| 160 | QUIT = "a1 LOGOUT\r\n"; | 156 | QUIT = "a1 LOGOUT\r\n"; |
| 161 | flags |= FLAG_SSL; | 157 | flags |= FLAG_SSL; |
| 162 | PORT = 993; | 158 | PORT = 993; |
| 163 | } | 159 | } else if (!strncmp(SERVICE, "SPOP", 4)) { |
| 164 | else if (!strncmp(SERVICE, "SPOP", 4)) { | ||
| 165 | EXPECT = "+OK"; | 160 | EXPECT = "+OK"; |
| 166 | QUIT = "QUIT\r\n"; | 161 | QUIT = "QUIT\r\n"; |
| 167 | flags |= FLAG_SSL; | 162 | flags |= FLAG_SSL; |
| 168 | PORT = 995; | 163 | PORT = 995; |
| 169 | } | 164 | } else if (!strncmp(SERVICE, "SSMTP", 5)) { |
| 170 | else if (!strncmp(SERVICE, "SSMTP", 5)) { | ||
| 171 | EXPECT = "220"; | 165 | EXPECT = "220"; |
| 172 | QUIT = "QUIT\r\n"; | 166 | QUIT = "QUIT\r\n"; |
| 173 | flags |= FLAG_SSL; | 167 | flags |= FLAG_SSL; |
| 174 | PORT = 465; | 168 | PORT = 465; |
| 175 | } | 169 | } else if (!strncmp(SERVICE, "JABBER", 6)) { |
| 176 | else if (!strncmp(SERVICE, "JABBER", 6)) { | ||
| 177 | SEND = "<stream:stream to=\'host\' xmlns=\'jabber:client\' xmlns:stream=\'http://etherx.jabber.org/streams\'>\n"; | 170 | SEND = "<stream:stream to=\'host\' xmlns=\'jabber:client\' xmlns:stream=\'http://etherx.jabber.org/streams\'>\n"; |
| 178 | EXPECT = "<?xml version=\'1.0\'"; | 171 | EXPECT = "<?xml version=\'1.0\'"; |
| 179 | QUIT = "</stream:stream>\n"; | 172 | QUIT = "</stream:stream>\n"; |
| 180 | flags |= FLAG_HIDE_OUTPUT; | 173 | flags |= FLAG_HIDE_OUTPUT; |
| 181 | PORT = 5222; | 174 | PORT = 5222; |
| 182 | } | 175 | } else if (!strncmp(SERVICE, "NNTPS", 5)) { |
| 183 | else if (!strncmp (SERVICE, "NNTPS", 5)) { | ||
| 184 | server_expect_count = 2; | 176 | server_expect_count = 2; |
| 185 | server_expect[0] = "200"; | 177 | server_expect[0] = "200"; |
| 186 | server_expect[1] = "201"; | 178 | server_expect[1] = "201"; |
| @@ -189,23 +181,22 @@ main (int argc, char **argv) | |||
| 189 | PORT = 563; | 181 | PORT = 563; |
| 190 | } | 182 | } |
| 191 | #endif | 183 | #endif |
| 192 | else if (!strncmp (SERVICE, "NNTP", 4)) { | 184 | else if (!strncmp(SERVICE, "NNTP", 4)) { |
| 193 | server_expect_count = 2; | 185 | server_expect_count = 2; |
| 194 | server_expect = malloc(sizeof(char *) * server_expect_count); | 186 | server_expect = malloc(sizeof(char *) * server_expect_count); |
| 195 | server_expect[0] = strdup("200"); | 187 | server_expect[0] = strdup("200"); |
| 196 | server_expect[1] = strdup("201"); | 188 | server_expect[1] = strdup("201"); |
| 197 | QUIT = "QUIT\r\n"; | 189 | QUIT = "QUIT\r\n"; |
| 198 | PORT = 119; | 190 | PORT = 119; |
| 199 | } | 191 | } else if (!strncmp(SERVICE, "CLAMD", 5)) { |
| 200 | else if (!strncmp(SERVICE, "CLAMD", 5)) { | ||
| 201 | SEND = "PING"; | 192 | SEND = "PING"; |
| 202 | EXPECT = "PONG"; | 193 | EXPECT = "PONG"; |
| 203 | QUIT = NULL; | 194 | QUIT = NULL; |
| 204 | PORT = 3310; | 195 | PORT = 3310; |
| 205 | } | 196 | } |
| 206 | /* fallthrough check, so it's supposed to use reverse matching */ | 197 | /* fallthrough check, so it's supposed to use reverse matching */ |
| 207 | else if (strcmp (SERVICE, "TCP")) | 198 | else if (strcmp(SERVICE, "TCP")) |
| 208 | usage (_("CRITICAL - Generic check_tcp called with unknown service\n")); | 199 | usage(_("CRITICAL - Generic check_tcp called with unknown service\n")); |
| 209 | 200 | ||
| 210 | server_address = "127.0.0.1"; | 201 | server_address = "127.0.0.1"; |
| 211 | server_port = PORT; | 202 | server_port = PORT; |
| @@ -214,58 +205,60 @@ main (int argc, char **argv) | |||
| 214 | status = NULL; | 205 | status = NULL; |
| 215 | 206 | ||
| 216 | /* Parse extra opts if any */ | 207 | /* Parse extra opts if any */ |
| 217 | argv=np_extra_opts (&argc, argv, progname); | 208 | argv = np_extra_opts(&argc, argv, progname); |
| 218 | 209 | ||
| 219 | if (process_arguments (argc, argv) == ERROR) | 210 | if (process_arguments(argc, argv) == ERROR) |
| 220 | usage4 (_("Could not parse arguments")); | 211 | usage4(_("Could not parse arguments")); |
| 221 | 212 | ||
| 222 | if(flags & FLAG_VERBOSE) { | 213 | if (flags & FLAG_VERBOSE) { |
| 223 | printf("Using service %s\n", SERVICE); | 214 | printf("Using service %s\n", SERVICE); |
| 224 | printf("Port: %d\n", server_port); | 215 | printf("Port: %d\n", server_port); |
| 225 | printf("flags: 0x%x\n", (int)flags); | 216 | printf("flags: 0x%x\n", (int)flags); |
| 226 | } | 217 | } |
| 227 | 218 | ||
| 228 | if(EXPECT && !server_expect_count) | 219 | if (EXPECT && !server_expect_count) |
| 229 | server_expect_count++; | 220 | server_expect_count++; |
| 230 | 221 | ||
| 231 | if(PROTOCOL==IPPROTO_UDP && !(server_expect_count && server_send)){ | 222 | if (PROTOCOL == IPPROTO_UDP && !(server_expect_count && server_send)) { |
| 232 | usage(_("With UDP checks, a send/expect string must be specified.")); | 223 | usage(_("With UDP checks, a send/expect string must be specified.")); |
| 233 | } | 224 | } |
| 234 | 225 | ||
| 235 | /* set up the timer */ | 226 | /* set up the timer */ |
| 236 | signal (SIGALRM, socket_timeout_alarm_handler); | 227 | signal(SIGALRM, socket_timeout_alarm_handler); |
| 237 | alarm (socket_timeout); | 228 | alarm(socket_timeout); |
| 238 | 229 | ||
| 239 | /* try to connect to the host at the given port number */ | 230 | /* try to connect to the host at the given port number */ |
| 240 | gettimeofday (&tv, NULL); | 231 | gettimeofday(&tv, NULL); |
| 241 | 232 | ||
| 242 | result = np_net_connect (server_address, server_port, &sd, PROTOCOL); | 233 | result = np_net_connect(server_address, server_port, &sd, PROTOCOL); |
| 243 | if (result == STATE_CRITICAL) return econn_refuse_state; | 234 | if (result == STATE_CRITICAL) |
| 235 | return econn_refuse_state; | ||
| 244 | 236 | ||
| 245 | #ifdef HAVE_SSL | 237 | #ifdef HAVE_SSL |
| 246 | if (flags & FLAG_SSL){ | 238 | if (flags & FLAG_SSL) { |
| 247 | result = np_net_ssl_init_with_hostname(sd, (sni_specified ? sni : NULL)); | 239 | result = np_net_ssl_init_with_hostname(sd, (sni_specified ? sni : NULL)); |
| 248 | if (result == STATE_OK && check_cert) { | 240 | if (result == STATE_OK && check_cert) { |
| 249 | result = np_net_ssl_check_cert(days_till_exp_warn, days_till_exp_crit); | 241 | result = np_net_ssl_check_cert(days_till_exp_warn, days_till_exp_crit); |
| 250 | } | 242 | } |
| 251 | } | 243 | } |
| 252 | if(result != STATE_OK){ | 244 | if (result != STATE_OK) { |
| 253 | if(sd) close(sd); | 245 | if (sd) |
| 246 | close(sd); | ||
| 254 | np_net_ssl_cleanup(); | 247 | np_net_ssl_cleanup(); |
| 255 | return result; | 248 | return result; |
| 256 | } | 249 | } |
| 257 | #endif /* HAVE_SSL */ | 250 | #endif /* HAVE_SSL */ |
| 258 | 251 | ||
| 259 | if (server_send != NULL) { /* Something to send? */ | 252 | if (server_send != NULL) { /* Something to send? */ |
| 260 | my_send(server_send, strlen(server_send)); | 253 | my_send(server_send, strlen(server_send)); |
| 261 | } | 254 | } |
| 262 | 255 | ||
| 263 | if (delay > 0) { | 256 | if (delay > 0) { |
| 264 | tv.tv_sec += delay; | 257 | tv.tv_sec += delay; |
| 265 | sleep (delay); | 258 | sleep(delay); |
| 266 | } | 259 | } |
| 267 | 260 | ||
| 268 | if(flags & FLAG_VERBOSE) { | 261 | if (flags & FLAG_VERBOSE) { |
| 269 | if (server_send) { | 262 | if (server_send) { |
| 270 | printf("Send string: %s\n", server_send); | 263 | printf("Send string: %s\n", server_send); |
| 271 | } | 264 | } |
| @@ -273,7 +266,7 @@ main (int argc, char **argv) | |||
| 273 | printf("Quit string: %s\n", server_quit); | 266 | printf("Quit string: %s\n", server_quit); |
| 274 | } | 267 | } |
| 275 | printf("server_expect_count: %d\n", (int)server_expect_count); | 268 | printf("server_expect_count: %d\n", (int)server_expect_count); |
| 276 | for(size_t i = 0; i < server_expect_count; i++) | 269 | for (size_t i = 0; i < server_expect_count; i++) |
| 277 | printf("\t%zd: %s\n", i, server_expect[i]); | 270 | printf("\t%zd: %s\n", i, server_expect[i]); |
| 278 | } | 271 | } |
| 279 | 272 | ||
| @@ -294,17 +287,14 @@ main (int argc, char **argv) | |||
| 294 | if (maxbytes && len >= maxbytes) | 287 | if (maxbytes && len >= maxbytes) |
| 295 | break; | 288 | break; |
| 296 | 289 | ||
| 297 | if ((match = np_expect_match(status, | 290 | if ((match = np_expect_match(status, server_expect, server_expect_count, match_flags)) != NP_MATCH_RETRY) |
| 298 | server_expect, | ||
| 299 | server_expect_count, | ||
| 300 | match_flags)) != NP_MATCH_RETRY) | ||
| 301 | break; | 291 | break; |
| 302 | 292 | ||
| 303 | /* some protocols wait for further input, so make sure we don't wait forever */ | 293 | /* some protocols wait for further input, so make sure we don't wait forever */ |
| 304 | FD_SET(sd, &rfds); | 294 | FD_SET(sd, &rfds); |
| 305 | timeout.tv_sec = READ_TIMEOUT; | 295 | timeout.tv_sec = READ_TIMEOUT; |
| 306 | timeout.tv_usec = 0; | 296 | timeout.tv_usec = 0; |
| 307 | if(select(sd + 1, &rfds, NULL, NULL, &timeout) <= 0) | 297 | if (select(sd + 1, &rfds, NULL, NULL, &timeout) <= 0) |
| 308 | break; | 298 | break; |
| 309 | } | 299 | } |
| 310 | 300 | ||
| @@ -313,26 +303,26 @@ main (int argc, char **argv) | |||
| 313 | 303 | ||
| 314 | /* no data when expected, so return critical */ | 304 | /* no data when expected, so return critical */ |
| 315 | if (len == 0) | 305 | if (len == 0) |
| 316 | die (STATE_CRITICAL, _("No data received from host\n")); | 306 | die(STATE_CRITICAL, _("No data received from host\n")); |
| 317 | 307 | ||
| 318 | /* print raw output if we're debugging */ | 308 | /* print raw output if we're debugging */ |
| 319 | if(flags & FLAG_VERBOSE) | 309 | if (flags & FLAG_VERBOSE) |
| 320 | printf("received %d bytes from host\n#-raw-recv-------#\n%s\n#-raw-recv-------#\n", | 310 | printf("received %d bytes from host\n#-raw-recv-------#\n%s\n#-raw-recv-------#\n", (int)len + 1, status); |
| 321 | (int)len + 1, status); | ||
| 322 | /* strip whitespace from end of output */ | 311 | /* strip whitespace from end of output */ |
| 323 | while(--len > 0 && isspace(status[len])) | 312 | while (--len > 0 && isspace(status[len])) |
| 324 | status[len] = '\0'; | 313 | status[len] = '\0'; |
| 325 | } | 314 | } |
| 326 | 315 | ||
| 327 | if (server_quit != NULL) { | 316 | if (server_quit != NULL) { |
| 328 | my_send(server_quit, strlen(server_quit)); | 317 | my_send(server_quit, strlen(server_quit)); |
| 329 | } | 318 | } |
| 330 | if (sd) close (sd); | 319 | if (sd) |
| 320 | close(sd); | ||
| 331 | #ifdef HAVE_SSL | 321 | #ifdef HAVE_SSL |
| 332 | np_net_ssl_cleanup(); | 322 | np_net_ssl_cleanup(); |
| 333 | #endif | 323 | #endif |
| 334 | 324 | ||
| 335 | microsec = deltime (tv); | 325 | microsec = deltime(tv); |
| 336 | elapsed_time = (double)microsec / 1.0e6; | 326 | elapsed_time = (double)microsec / 1.0e6; |
| 337 | 327 | ||
| 338 | if (flags & FLAG_TIME_CRIT && elapsed_time > critical_time) | 328 | if (flags & FLAG_TIME_CRIT && elapsed_time > critical_time) |
| @@ -341,66 +331,52 @@ main (int argc, char **argv) | |||
| 341 | result = STATE_WARNING; | 331 | result = STATE_WARNING; |
| 342 | 332 | ||
| 343 | /* did we get the response we hoped? */ | 333 | /* did we get the response we hoped? */ |
| 344 | if(match == NP_MATCH_FAILURE && result != STATE_CRITICAL) | 334 | if (match == NP_MATCH_FAILURE && result != STATE_CRITICAL) |
| 345 | result = expect_mismatch_state; | 335 | result = expect_mismatch_state; |
| 346 | 336 | ||
| 347 | /* reset the alarm */ | 337 | /* reset the alarm */ |
| 348 | alarm (0); | 338 | alarm(0); |
| 349 | 339 | ||
| 350 | /* this is a bit stupid, because we don't want to print the | 340 | /* this is a bit stupid, because we don't want to print the |
| 351 | * response time (which can look ok to the user) if we didn't get | 341 | * response time (which can look ok to the user) if we didn't get |
| 352 | * the response we were looking for. if-else */ | 342 | * the response we were looking for. if-else */ |
| 353 | printf("%s %s - ", SERVICE, state_text(result)); | 343 | printf("%s %s - ", SERVICE, state_text(result)); |
| 354 | 344 | ||
| 355 | if(match == NP_MATCH_FAILURE && len && !(flags & FLAG_HIDE_OUTPUT)) | 345 | if (match == NP_MATCH_FAILURE && len && !(flags & FLAG_HIDE_OUTPUT)) |
| 356 | printf("Unexpected response from host/socket: %s", status); | 346 | printf("Unexpected response from host/socket: %s", status); |
| 357 | else { | 347 | else { |
| 358 | if(match == NP_MATCH_FAILURE) | 348 | if (match == NP_MATCH_FAILURE) |
| 359 | printf("Unexpected response from host/socket on "); | 349 | printf("Unexpected response from host/socket on "); |
| 360 | else | 350 | else |
| 361 | printf("%.3f second response time on ", elapsed_time); | 351 | printf("%.3f second response time on ", elapsed_time); |
| 362 | if(server_address[0] != '/') { | 352 | if (server_address[0] != '/') { |
| 363 | if (host_specified) | 353 | if (host_specified) |
| 364 | printf("%s port %d", | 354 | printf("%s port %d", server_address, server_port); |
| 365 | server_address, server_port); | ||
| 366 | else | 355 | else |
| 367 | printf("port %d", server_port); | 356 | printf("port %d", server_port); |
| 368 | } | 357 | } else |
| 369 | else | ||
| 370 | printf("socket %s", server_address); | 358 | printf("socket %s", server_address); |
| 371 | } | 359 | } |
| 372 | 360 | ||
| 373 | if (match != NP_MATCH_FAILURE && !(flags & FLAG_HIDE_OUTPUT) && len) | 361 | if (match != NP_MATCH_FAILURE && !(flags & FLAG_HIDE_OUTPUT) && len) |
| 374 | printf (" [%s]", status); | 362 | printf(" [%s]", status); |
| 375 | 363 | ||
| 376 | /* perf-data doesn't apply when server doesn't talk properly, | 364 | /* perf-data doesn't apply when server doesn't talk properly, |
| 377 | * so print all zeroes on warn and crit. Use fperfdata since | 365 | * so print all zeroes on warn and crit. Use fperfdata since |
| 378 | * localisation settings can make different outputs */ | 366 | * localisation settings can make different outputs */ |
| 379 | if(match == NP_MATCH_FAILURE) | 367 | if (match == NP_MATCH_FAILURE) |
| 380 | printf ("|%s", | 368 | printf("|%s", fperfdata("time", elapsed_time, "s", (flags & FLAG_TIME_WARN ? true : false), 0, |
| 381 | fperfdata ("time", elapsed_time, "s", | 369 | (flags & FLAG_TIME_CRIT ? true : false), 0, true, 0, true, socket_timeout)); |
| 382 | (flags & FLAG_TIME_WARN ? true : false), 0, | ||
| 383 | (flags & FLAG_TIME_CRIT ? true : false), 0, | ||
| 384 | true, 0, | ||
| 385 | true, socket_timeout) | ||
| 386 | ); | ||
| 387 | else | 370 | else |
| 388 | printf("|%s", | 371 | printf("|%s", fperfdata("time", elapsed_time, "s", (flags & FLAG_TIME_WARN ? true : false), warning_time, |
| 389 | fperfdata ("time", elapsed_time, "s", | 372 | (flags & FLAG_TIME_CRIT ? true : false), critical_time, true, 0, true, socket_timeout)); |
| 390 | (flags & FLAG_TIME_WARN ? true : false), warning_time, | ||
| 391 | (flags & FLAG_TIME_CRIT ? true : false), critical_time, | ||
| 392 | true, 0, | ||
| 393 | true, socket_timeout) | ||
| 394 | ); | ||
| 395 | 373 | ||
| 396 | putchar('\n'); | 374 | putchar('\n'); |
| 397 | return result; | 375 | return result; |
| 398 | } | 376 | } |
| 399 | 377 | ||
| 400 | |||
| 401 | |||
| 402 | /* process command-line arguments */ | 378 | /* process command-line arguments */ |
| 403 | static int process_arguments (int argc, char **argv) { | 379 | static int process_arguments(int argc, char **argv) { |
| 404 | int c; | 380 | int c; |
| 405 | bool escape = false; | 381 | bool escape = false; |
| 406 | char *temp; | 382 | char *temp; |
| @@ -410,50 +386,48 @@ static int process_arguments (int argc, char **argv) { | |||
| 410 | }; | 386 | }; |
| 411 | 387 | ||
| 412 | int option = 0; | 388 | int option = 0; |
| 413 | static struct option longopts[] = { | 389 | static struct option longopts[] = {{"hostname", required_argument, 0, 'H'}, |
| 414 | {"hostname", required_argument, 0, 'H'}, | 390 | {"critical", required_argument, 0, 'c'}, |
| 415 | {"critical", required_argument, 0, 'c'}, | 391 | {"warning", required_argument, 0, 'w'}, |
| 416 | {"warning", required_argument, 0, 'w'}, | 392 | {"critical-codes", required_argument, 0, 'C'}, |
| 417 | {"critical-codes", required_argument, 0, 'C'}, | 393 | {"warning-codes", required_argument, 0, 'W'}, |
| 418 | {"warning-codes", required_argument, 0, 'W'}, | 394 | {"timeout", required_argument, 0, 't'}, |
| 419 | {"timeout", required_argument, 0, 't'}, | 395 | {"protocol", required_argument, 0, 'P'}, /* FIXME: Unhandled */ |
| 420 | {"protocol", required_argument, 0, 'P'}, /* FIXME: Unhandled */ | 396 | {"port", required_argument, 0, 'p'}, |
| 421 | {"port", required_argument, 0, 'p'}, | 397 | {"escape", no_argument, 0, 'E'}, |
| 422 | {"escape", no_argument, 0, 'E'}, | 398 | {"all", no_argument, 0, 'A'}, |
| 423 | {"all", no_argument, 0, 'A'}, | 399 | {"send", required_argument, 0, 's'}, |
| 424 | {"send", required_argument, 0, 's'}, | 400 | {"expect", required_argument, 0, 'e'}, |
| 425 | {"expect", required_argument, 0, 'e'}, | 401 | {"maxbytes", required_argument, 0, 'm'}, |
| 426 | {"maxbytes", required_argument, 0, 'm'}, | 402 | {"quit", required_argument, 0, 'q'}, |
| 427 | {"quit", required_argument, 0, 'q'}, | 403 | {"jail", no_argument, 0, 'j'}, |
| 428 | {"jail", no_argument, 0, 'j'}, | 404 | {"delay", required_argument, 0, 'd'}, |
| 429 | {"delay", required_argument, 0, 'd'}, | 405 | {"refuse", required_argument, 0, 'r'}, |
| 430 | {"refuse", required_argument, 0, 'r'}, | 406 | {"mismatch", required_argument, 0, 'M'}, |
| 431 | {"mismatch", required_argument, 0, 'M'}, | 407 | {"use-ipv4", no_argument, 0, '4'}, |
| 432 | {"use-ipv4", no_argument, 0, '4'}, | 408 | {"use-ipv6", no_argument, 0, '6'}, |
| 433 | {"use-ipv6", no_argument, 0, '6'}, | 409 | {"verbose", no_argument, 0, 'v'}, |
| 434 | {"verbose", no_argument, 0, 'v'}, | 410 | {"version", no_argument, 0, 'V'}, |
| 435 | {"version", no_argument, 0, 'V'}, | 411 | {"help", no_argument, 0, 'h'}, |
| 436 | {"help", no_argument, 0, 'h'}, | 412 | {"ssl", no_argument, 0, 'S'}, |
| 437 | {"ssl", no_argument, 0, 'S'}, | 413 | {"sni", required_argument, 0, SNI_OPTION}, |
| 438 | {"sni", required_argument, 0, SNI_OPTION}, | 414 | {"certificate", required_argument, 0, 'D'}, |
| 439 | {"certificate", required_argument, 0, 'D'}, | 415 | {0, 0, 0, 0}}; |
| 440 | {0, 0, 0, 0} | ||
| 441 | }; | ||
| 442 | 416 | ||
| 443 | if (argc < 2) | 417 | if (argc < 2) |
| 444 | usage4 (_("No arguments found")); | 418 | usage4(_("No arguments found")); |
| 445 | 419 | ||
| 446 | /* backwards compatibility */ | 420 | /* backwards compatibility */ |
| 447 | for (c = 1; c < argc; c++) { | 421 | for (c = 1; c < argc; c++) { |
| 448 | if (strcmp ("-to", argv[c]) == 0) | 422 | if (strcmp("-to", argv[c]) == 0) |
| 449 | strcpy (argv[c], "-t"); | 423 | strcpy(argv[c], "-t"); |
| 450 | else if (strcmp ("-wt", argv[c]) == 0) | 424 | else if (strcmp("-wt", argv[c]) == 0) |
| 451 | strcpy (argv[c], "-w"); | 425 | strcpy(argv[c], "-w"); |
| 452 | else if (strcmp ("-ct", argv[c]) == 0) | 426 | else if (strcmp("-ct", argv[c]) == 0) |
| 453 | strcpy (argv[c], "-c"); | 427 | strcpy(argv[c], "-c"); |
| 454 | } | 428 | } |
| 455 | 429 | ||
| 456 | if (!is_option (argv[1])) { | 430 | if (!is_option(argv[1])) { |
| 457 | server_address = argv[1]; | 431 | server_address = argv[1]; |
| 458 | argv[1] = argv[0]; | 432 | argv[1] = argv[0]; |
| 459 | argv = &argv[1]; | 433 | argv = &argv[1]; |
| @@ -461,22 +435,21 @@ static int process_arguments (int argc, char **argv) { | |||
| 461 | } | 435 | } |
| 462 | 436 | ||
| 463 | while (1) { | 437 | while (1) { |
| 464 | c = getopt_long (argc, argv, "+hVv46EAH:s:e:q:m:c:w:t:p:C:W:d:Sr:jD:M:", | 438 | c = getopt_long(argc, argv, "+hVv46EAH:s:e:q:m:c:w:t:p:C:W:d:Sr:jD:M:", longopts, &option); |
| 465 | longopts, &option); | ||
| 466 | 439 | ||
| 467 | if (c == -1 || c == EOF || c == 1) | 440 | if (c == -1 || c == EOF || c == 1) |
| 468 | break; | 441 | break; |
| 469 | 442 | ||
| 470 | switch (c) { | 443 | switch (c) { |
| 471 | case '?': /* print short usage statement if args not parsable */ | 444 | case '?': /* print short usage statement if args not parsable */ |
| 472 | usage5 (); | 445 | usage5(); |
| 473 | case 'h': /* help */ | 446 | case 'h': /* help */ |
| 474 | print_help (); | 447 | print_help(); |
| 475 | exit (STATE_UNKNOWN); | 448 | exit(STATE_UNKNOWN); |
| 476 | case 'V': /* version */ | 449 | case 'V': /* version */ |
| 477 | print_revision (progname, NP_VERSION); | 450 | print_revision(progname, NP_VERSION); |
| 478 | exit (STATE_UNKNOWN); | 451 | exit(STATE_UNKNOWN); |
| 479 | case 'v': /* verbose mode */ | 452 | case 'v': /* verbose mode */ |
| 480 | flags |= FLAG_VERBOSE; | 453 | flags |= FLAG_VERBOSE; |
| 481 | match_flags |= NP_MATCH_VERBOSE; | 454 | match_flags |= NP_MATCH_VERBOSE; |
| 482 | break; | 455 | break; |
| @@ -487,43 +460,43 @@ static int process_arguments (int argc, char **argv) { | |||
| 487 | #ifdef USE_IPV6 | 460 | #ifdef USE_IPV6 |
| 488 | address_family = AF_INET6; | 461 | address_family = AF_INET6; |
| 489 | #else | 462 | #else |
| 490 | usage4 (_("IPv6 support not available")); | 463 | usage4(_("IPv6 support not available")); |
| 491 | #endif | 464 | #endif |
| 492 | break; | 465 | break; |
| 493 | case 'H': /* hostname */ | 466 | case 'H': /* hostname */ |
| 494 | host_specified = true; | 467 | host_specified = true; |
| 495 | server_address = optarg; | 468 | server_address = optarg; |
| 496 | break; | 469 | break; |
| 497 | case 'c': /* critical */ | 470 | case 'c': /* critical */ |
| 498 | critical_time = strtod (optarg, NULL); | 471 | critical_time = strtod(optarg, NULL); |
| 499 | flags |= FLAG_TIME_CRIT; | 472 | flags |= FLAG_TIME_CRIT; |
| 500 | break; | 473 | break; |
| 501 | case 'j': /* hide output */ | 474 | case 'j': /* hide output */ |
| 502 | flags |= FLAG_HIDE_OUTPUT; | 475 | flags |= FLAG_HIDE_OUTPUT; |
| 503 | break; | 476 | break; |
| 504 | case 'w': /* warning */ | 477 | case 'w': /* warning */ |
| 505 | warning_time = strtod (optarg, NULL); | 478 | warning_time = strtod(optarg, NULL); |
| 506 | flags |= FLAG_TIME_WARN; | 479 | flags |= FLAG_TIME_WARN; |
| 507 | break; | 480 | break; |
| 508 | case 'C': | 481 | case 'C': |
| 509 | crit_codes = realloc (crit_codes, ++crit_codes_count); | 482 | crit_codes = realloc(crit_codes, ++crit_codes_count); |
| 510 | crit_codes[crit_codes_count - 1] = optarg; | 483 | crit_codes[crit_codes_count - 1] = optarg; |
| 511 | break; | 484 | break; |
| 512 | case 'W': | 485 | case 'W': |
| 513 | warn_codes = realloc (warn_codes, ++warn_codes_count); | 486 | warn_codes = realloc(warn_codes, ++warn_codes_count); |
| 514 | warn_codes[warn_codes_count - 1] = optarg; | 487 | warn_codes[warn_codes_count - 1] = optarg; |
| 515 | break; | 488 | break; |
| 516 | case 't': /* timeout */ | 489 | case 't': /* timeout */ |
| 517 | if (!is_intpos (optarg)) | 490 | if (!is_intpos(optarg)) |
| 518 | usage4 (_("Timeout interval must be a positive integer")); | 491 | usage4(_("Timeout interval must be a positive integer")); |
| 519 | else | 492 | else |
| 520 | socket_timeout = atoi (optarg); | 493 | socket_timeout = atoi(optarg); |
| 521 | break; | 494 | break; |
| 522 | case 'p': /* port */ | 495 | case 'p': /* port */ |
| 523 | if (!is_intpos (optarg)) | 496 | if (!is_intpos(optarg)) |
| 524 | usage4 (_("Port must be a positive integer")); | 497 | usage4(_("Port must be a positive integer")); |
| 525 | else | 498 | else |
| 526 | server_port = atoi (optarg); | 499 | server_port = atoi(optarg); |
| 527 | break; | 500 | break; |
| 528 | case 'E': | 501 | case 'E': |
| 529 | escape = true; | 502 | escape = true; |
| @@ -537,16 +510,16 @@ static int process_arguments (int argc, char **argv) { | |||
| 537 | case 'e': /* expect string (may be repeated) */ | 510 | case 'e': /* expect string (may be repeated) */ |
| 538 | match_flags &= ~NP_MATCH_EXACT; | 511 | match_flags &= ~NP_MATCH_EXACT; |
| 539 | if (server_expect_count == 0) | 512 | if (server_expect_count == 0) |
| 540 | server_expect = malloc (sizeof (char *) * (++server_expect_count)); | 513 | server_expect = malloc(sizeof(char *) * (++server_expect_count)); |
| 541 | else | 514 | else |
| 542 | server_expect = realloc (server_expect, sizeof (char *) * (++server_expect_count)); | 515 | server_expect = realloc(server_expect, sizeof(char *) * (++server_expect_count)); |
| 543 | server_expect[server_expect_count - 1] = optarg; | 516 | server_expect[server_expect_count - 1] = optarg; |
| 544 | break; | 517 | break; |
| 545 | case 'm': | 518 | case 'm': |
| 546 | if (!is_intpos (optarg)) | 519 | if (!is_intpos(optarg)) |
| 547 | usage4 (_("Maxbytes must be a positive integer")); | 520 | usage4(_("Maxbytes must be a positive integer")); |
| 548 | else | 521 | else |
| 549 | maxbytes = strtol (optarg, NULL, 0); | 522 | maxbytes = strtol(optarg, NULL, 0); |
| 550 | break; | 523 | break; |
| 551 | case 'q': | 524 | case 'q': |
| 552 | if (escape) | 525 | if (escape) |
| @@ -555,62 +528,61 @@ static int process_arguments (int argc, char **argv) { | |||
| 555 | xasprintf(&server_quit, "%s\r\n", optarg); | 528 | xasprintf(&server_quit, "%s\r\n", optarg); |
| 556 | break; | 529 | break; |
| 557 | case 'r': | 530 | case 'r': |
| 558 | if (!strncmp(optarg,"ok",2)) | 531 | if (!strncmp(optarg, "ok", 2)) |
| 559 | econn_refuse_state = STATE_OK; | 532 | econn_refuse_state = STATE_OK; |
| 560 | else if (!strncmp(optarg,"warn",4)) | 533 | else if (!strncmp(optarg, "warn", 4)) |
| 561 | econn_refuse_state = STATE_WARNING; | 534 | econn_refuse_state = STATE_WARNING; |
| 562 | else if (!strncmp(optarg,"crit",4)) | 535 | else if (!strncmp(optarg, "crit", 4)) |
| 563 | econn_refuse_state = STATE_CRITICAL; | 536 | econn_refuse_state = STATE_CRITICAL; |
| 564 | else | 537 | else |
| 565 | usage4 (_("Refuse must be one of ok, warn, crit")); | 538 | usage4(_("Refuse must be one of ok, warn, crit")); |
| 566 | break; | 539 | break; |
| 567 | case 'M': | 540 | case 'M': |
| 568 | if (!strncmp(optarg,"ok",2)) | 541 | if (!strncmp(optarg, "ok", 2)) |
| 569 | expect_mismatch_state = STATE_OK; | 542 | expect_mismatch_state = STATE_OK; |
| 570 | else if (!strncmp(optarg,"warn",4)) | 543 | else if (!strncmp(optarg, "warn", 4)) |
| 571 | expect_mismatch_state = STATE_WARNING; | 544 | expect_mismatch_state = STATE_WARNING; |
| 572 | else if (!strncmp(optarg,"crit",4)) | 545 | else if (!strncmp(optarg, "crit", 4)) |
| 573 | expect_mismatch_state = STATE_CRITICAL; | 546 | expect_mismatch_state = STATE_CRITICAL; |
| 574 | else | 547 | else |
| 575 | usage4 (_("Mismatch must be one of ok, warn, crit")); | 548 | usage4(_("Mismatch must be one of ok, warn, crit")); |
| 576 | break; | 549 | break; |
| 577 | case 'd': | 550 | case 'd': |
| 578 | if (is_intpos (optarg)) | 551 | if (is_intpos(optarg)) |
| 579 | delay = atoi (optarg); | 552 | delay = atoi(optarg); |
| 580 | else | 553 | else |
| 581 | usage4 (_("Delay must be a positive integer")); | 554 | usage4(_("Delay must be a positive integer")); |
| 582 | break; | 555 | break; |
| 583 | case 'D': /* Check SSL cert validity - days 'til certificate expiration */ | 556 | case 'D': /* Check SSL cert validity - days 'til certificate expiration */ |
| 584 | #ifdef HAVE_SSL | 557 | #ifdef HAVE_SSL |
| 585 | # ifdef USE_OPENSSL /* XXX */ | 558 | # ifdef USE_OPENSSL /* XXX */ |
| 586 | if ((temp=strchr(optarg,','))!=NULL) { | 559 | if ((temp = strchr(optarg, ',')) != NULL) { |
| 587 | *temp='\0'; | 560 | *temp = '\0'; |
| 588 | if (!is_intnonneg (optarg)) | 561 | if (!is_intnonneg(optarg)) |
| 589 | usage2 (_("Invalid certificate expiration period"), optarg); | 562 | usage2(_("Invalid certificate expiration period"), optarg); |
| 590 | days_till_exp_warn = atoi (optarg); | 563 | days_till_exp_warn = atoi(optarg); |
| 591 | *temp=','; | 564 | *temp = ','; |
| 592 | temp++; | 565 | temp++; |
| 593 | if (!is_intnonneg (temp)) | 566 | if (!is_intnonneg(temp)) |
| 594 | usage2 (_("Invalid certificate expiration period"), temp); | 567 | usage2(_("Invalid certificate expiration period"), temp); |
| 595 | days_till_exp_crit = atoi (temp); | 568 | days_till_exp_crit = atoi(temp); |
| 596 | } | 569 | } else { |
| 597 | else { | 570 | days_till_exp_crit = 0; |
| 598 | days_till_exp_crit=0; | 571 | if (!is_intnonneg(optarg)) |
| 599 | if (!is_intnonneg (optarg)) | 572 | usage2(_("Invalid certificate expiration period"), optarg); |
| 600 | usage2 (_("Invalid certificate expiration period"), optarg); | 573 | days_till_exp_warn = atoi(optarg); |
| 601 | days_till_exp_warn = atoi (optarg); | ||
| 602 | } | 574 | } |
| 603 | check_cert = true; | 575 | check_cert = true; |
| 604 | flags |= FLAG_SSL; | 576 | flags |= FLAG_SSL; |
| 605 | break; | 577 | break; |
| 606 | # endif /* USE_OPENSSL */ | 578 | # endif /* USE_OPENSSL */ |
| 607 | #endif | 579 | #endif |
| 608 | /* fallthrough if we don't have ssl */ | 580 | /* fallthrough if we don't have ssl */ |
| 609 | case 'S': | 581 | case 'S': |
| 610 | #ifdef HAVE_SSL | 582 | #ifdef HAVE_SSL |
| 611 | flags |= FLAG_SSL; | 583 | flags |= FLAG_SSL; |
| 612 | #else | 584 | #else |
| 613 | die (STATE_UNKNOWN, _("Invalid option - SSL is not available")); | 585 | die(STATE_UNKNOWN, _("Invalid option - SSL is not available")); |
| 614 | #endif | 586 | #endif |
| 615 | break; | 587 | break; |
| 616 | case SNI_OPTION: | 588 | case SNI_OPTION: |
| @@ -619,7 +591,7 @@ static int process_arguments (int argc, char **argv) { | |||
| 619 | sni_specified = true; | 591 | sni_specified = true; |
| 620 | sni = optarg; | 592 | sni = optarg; |
| 621 | #else | 593 | #else |
| 622 | die (STATE_UNKNOWN, _("Invalid option - SSL is not available")); | 594 | die(STATE_UNKNOWN, _("Invalid option - SSL is not available")); |
| 623 | #endif | 595 | #endif |
| 624 | break; | 596 | break; |
| 625 | case 'A': | 597 | case 'A': |
| @@ -629,86 +601,80 @@ static int process_arguments (int argc, char **argv) { | |||
| 629 | } | 601 | } |
| 630 | 602 | ||
| 631 | c = optind; | 603 | c = optind; |
| 632 | if(!host_specified && c < argc) | 604 | if (!host_specified && c < argc) |
| 633 | server_address = strdup (argv[c++]); | 605 | server_address = strdup(argv[c++]); |
| 634 | 606 | ||
| 635 | if (server_address == NULL) | 607 | if (server_address == NULL) |
| 636 | usage4 (_("You must provide a server address")); | 608 | usage4(_("You must provide a server address")); |
| 637 | else if (server_address[0] != '/' && !is_host(server_address)) | 609 | else if (server_address[0] != '/' && !is_host(server_address)) |
| 638 | die (STATE_CRITICAL, "%s %s - %s: %s\n", SERVICE, state_text(STATE_CRITICAL), _("Invalid hostname, address or socket"), server_address); | 610 | die(STATE_CRITICAL, "%s %s - %s: %s\n", SERVICE, state_text(STATE_CRITICAL), _("Invalid hostname, address or socket"), |
| 611 | server_address); | ||
| 639 | 612 | ||
| 640 | return OK; | 613 | return OK; |
| 641 | } | 614 | } |
| 642 | 615 | ||
| 643 | 616 | void print_help(void) { | |
| 644 | void | 617 | print_revision(progname, NP_VERSION); |
| 645 | print_help (void) | 618 | |
| 646 | { | 619 | printf("Copyright (c) 1999 Ethan Galstad <nagios@nagios.org>\n"); |
| 647 | print_revision (progname, NP_VERSION); | 620 | printf(COPYRIGHT, copyright, email); |
| 648 | 621 | ||
| 649 | printf ("Copyright (c) 1999 Ethan Galstad <nagios@nagios.org>\n"); | 622 | printf(_("This plugin tests %s connections with the specified host (or unix socket).\n\n"), SERVICE); |
| 650 | printf (COPYRIGHT, copyright, email); | 623 | |
| 651 | 624 | print_usage(); | |
| 652 | printf (_("This plugin tests %s connections with the specified host (or unix socket).\n\n"), | 625 | |
| 653 | SERVICE); | 626 | printf(UT_HELP_VRSN); |
| 654 | 627 | printf(UT_EXTRA_OPTS); | |
| 655 | print_usage (); | 628 | |
| 656 | 629 | printf(UT_HOST_PORT, 'p', "none"); | |
| 657 | printf (UT_HELP_VRSN); | 630 | |
| 658 | printf (UT_EXTRA_OPTS); | 631 | printf(UT_IPv46); |
| 659 | 632 | ||
| 660 | printf (UT_HOST_PORT, 'p', "none"); | 633 | printf(" %s\n", "-E, --escape"); |
| 661 | 634 | printf(" %s\n", _("Can use \\n, \\r, \\t or \\\\ in send or quit string. Must come before send or quit option")); | |
| 662 | printf (UT_IPv46); | 635 | printf(" %s\n", _("Default: nothing added to send, \\r\\n added to end of quit")); |
| 663 | 636 | printf(" %s\n", "-s, --send=STRING"); | |
| 664 | printf (" %s\n", "-E, --escape"); | 637 | printf(" %s\n", _("String to send to the server")); |
| 665 | printf (" %s\n", _("Can use \\n, \\r, \\t or \\\\ in send or quit string. Must come before send or quit option")); | 638 | printf(" %s\n", "-e, --expect=STRING"); |
| 666 | printf (" %s\n", _("Default: nothing added to send, \\r\\n added to end of quit")); | 639 | printf(" %s %s\n", _("String to expect in server response"), _("(may be repeated)")); |
| 667 | printf (" %s\n", "-s, --send=STRING"); | 640 | printf(" %s\n", "-A, --all"); |
| 668 | printf (" %s\n", _("String to send to the server")); | 641 | printf(" %s\n", _("All expect strings need to occur in server response. Default is any")); |
| 669 | printf (" %s\n", "-e, --expect=STRING"); | 642 | printf(" %s\n", "-q, --quit=STRING"); |
| 670 | printf (" %s %s\n", _("String to expect in server response"), _("(may be repeated)")); | 643 | printf(" %s\n", _("String to send server to initiate a clean close of the connection")); |
| 671 | printf (" %s\n", "-A, --all"); | 644 | printf(" %s\n", "-r, --refuse=ok|warn|crit"); |
| 672 | printf (" %s\n", _("All expect strings need to occur in server response. Default is any")); | 645 | printf(" %s\n", _("Accept TCP refusals with states ok, warn, crit (default: crit)")); |
| 673 | printf (" %s\n", "-q, --quit=STRING"); | 646 | printf(" %s\n", "-M, --mismatch=ok|warn|crit"); |
| 674 | printf (" %s\n", _("String to send server to initiate a clean close of the connection")); | 647 | printf(" %s\n", _("Accept expected string mismatches with states ok, warn, crit (default: warn)")); |
| 675 | printf (" %s\n", "-r, --refuse=ok|warn|crit"); | 648 | printf(" %s\n", "-j, --jail"); |
| 676 | printf (" %s\n", _("Accept TCP refusals with states ok, warn, crit (default: crit)")); | 649 | printf(" %s\n", _("Hide output from TCP socket")); |
| 677 | printf (" %s\n", "-M, --mismatch=ok|warn|crit"); | 650 | printf(" %s\n", "-m, --maxbytes=INTEGER"); |
| 678 | printf (" %s\n", _("Accept expected string mismatches with states ok, warn, crit (default: warn)")); | 651 | printf(" %s\n", _("Close connection once more than this number of bytes are received")); |
| 679 | printf (" %s\n", "-j, --jail"); | 652 | printf(" %s\n", "-d, --delay=INTEGER"); |
| 680 | printf (" %s\n", _("Hide output from TCP socket")); | 653 | printf(" %s\n", _("Seconds to wait between sending string and polling for response")); |
| 681 | printf (" %s\n", "-m, --maxbytes=INTEGER"); | ||
| 682 | printf (" %s\n", _("Close connection once more than this number of bytes are received")); | ||
| 683 | printf (" %s\n", "-d, --delay=INTEGER"); | ||
| 684 | printf (" %s\n", _("Seconds to wait between sending string and polling for response")); | ||
| 685 | 654 | ||
| 686 | #ifdef HAVE_SSL | 655 | #ifdef HAVE_SSL |
| 687 | printf (" %s\n", "-D, --certificate=INTEGER[,INTEGER]"); | 656 | printf(" %s\n", "-D, --certificate=INTEGER[,INTEGER]"); |
| 688 | printf (" %s\n", _("Minimum number of days a certificate has to be valid.")); | 657 | printf(" %s\n", _("Minimum number of days a certificate has to be valid.")); |
| 689 | printf (" %s\n", _("1st is #days for warning, 2nd is critical (if not specified - 0).")); | 658 | printf(" %s\n", _("1st is #days for warning, 2nd is critical (if not specified - 0).")); |
| 690 | printf (" %s\n", "-S, --ssl"); | 659 | printf(" %s\n", "-S, --ssl"); |
| 691 | printf (" %s\n", _("Use SSL for the connection.")); | 660 | printf(" %s\n", _("Use SSL for the connection.")); |
| 692 | printf (" %s\n", "--sni=STRING"); | 661 | printf(" %s\n", "--sni=STRING"); |
| 693 | printf (" %s\n", _("SSL server_name")); | 662 | printf(" %s\n", _("SSL server_name")); |
| 694 | #endif | 663 | #endif |
| 695 | 664 | ||
| 696 | printf (UT_WARN_CRIT); | 665 | printf(UT_WARN_CRIT); |
| 697 | 666 | ||
| 698 | printf (UT_CONN_TIMEOUT, DEFAULT_SOCKET_TIMEOUT); | 667 | printf(UT_CONN_TIMEOUT, DEFAULT_SOCKET_TIMEOUT); |
| 699 | 668 | ||
| 700 | printf (UT_VERBOSE); | 669 | printf(UT_VERBOSE); |
| 701 | 670 | ||
| 702 | printf (UT_SUPPORT); | 671 | printf(UT_SUPPORT); |
| 703 | } | 672 | } |
| 704 | 673 | ||
| 705 | 674 | void print_usage(void) { | |
| 706 | void | 675 | printf("%s\n", _("Usage:")); |
| 707 | print_usage (void) | 676 | printf("%s -H host -p port [-w <warning time>] [-c <critical time>] [-s <send string>]\n", progname); |
| 708 | { | 677 | printf("[-e <expect string>] [-q <quit string>][-m <maximum bytes>] [-d <delay>]\n"); |
| 709 | printf ("%s\n", _("Usage:")); | 678 | printf("[-t <timeout seconds>] [-r <refuse state>] [-M <mismatch state>] [-v] [-4|-6] [-j]\n"); |
| 710 | printf ("%s -H host -p port [-w <warning time>] [-c <critical time>] [-s <send string>]\n",progname); | 679 | printf("[-D <warn days cert expire>[,<crit days cert expire>]] [-S <use SSL>] [-E]\n"); |
| 711 | printf ("[-e <expect string>] [-q <quit string>][-m <maximum bytes>] [-d <delay>]\n"); | ||
| 712 | printf ("[-t <timeout seconds>] [-r <refuse state>] [-M <mismatch state>] [-v] [-4|-6] [-j]\n"); | ||
| 713 | printf ("[-D <warn days cert expire>[,<crit days cert expire>]] [-S <use SSL>] [-E]\n"); | ||
| 714 | } | 680 | } |
