/*****************************************************************************
*
* Monitoring Plugins network utilities
*
* License: GPL
* Copyright (c) 1999 Ethan Galstad (nagios@nagios.org)
* Copyright (c) 2003-2024 Monitoring Plugins Development Team
*
* Description:
*
* This file contains commons functions used in many of the plugins.
*
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see .
*
*
*****************************************************************************/
#include "common.h"
#include "output.h"
#include "states.h"
#include
#include "netutils.h"
unsigned int socket_timeout = DEFAULT_SOCKET_TIMEOUT;
mp_state_enum socket_timeout_state = STATE_CRITICAL;
mp_state_enum econn_refuse_state = STATE_CRITICAL;
bool was_refused = false;
#if USE_IPV6
int address_family = AF_UNSPEC;
#else
int address_family = AF_INET;
#endif
/* handles socket timeouts */
void socket_timeout_alarm_handler(int sig) {
mp_subcheck timeout_sc = mp_subcheck_init();
timeout_sc = mp_set_subcheck_state(timeout_sc, socket_timeout_state);
if (sig == SIGALRM) {
xasprintf(&timeout_sc.output, _("Socket timeout after %d seconds\n"), socket_timeout);
} else {
xasprintf(&timeout_sc.output, _("Abnormal timeout after %d seconds\n"), socket_timeout);
}
mp_check overall = mp_check_init();
mp_add_subcheck_to_check(&overall, timeout_sc);
mp_exit(overall);
}
/* connects to a host on a specified tcp port, sends a string, and gets a
response. loops on select-recv until timeout or eof to get all of a
multi-packet answer */
mp_state_enum process_tcp_request2(const char *server_address, const int server_port,
const char *send_buffer, char *recv_buffer,
const int recv_size) {
int socket;
mp_state_enum connect_result =
np_net_connect(server_address, server_port, &socket, IPPROTO_TCP);
if (connect_result != STATE_OK) {
return STATE_CRITICAL;
}
mp_state_enum result;
ssize_t send_result = send(socket, send_buffer, strlen(send_buffer), 0);
if (send_result < 0 || (size_t)send_result != strlen(send_buffer)) {
// printf("%s\n", _("Send failed"));
result = STATE_WARNING;
}
fd_set readfds;
ssize_t recv_length = 0;
while (true) {
/* wait up to the number of seconds for socket timeout
minus one for data from the host */
struct timeval timeout = {
.tv_sec = socket_timeout - 1,
.tv_usec = 0,
};
FD_ZERO(&readfds);
FD_SET(socket, &readfds);
select(socket + 1, &readfds, NULL, NULL, &timeout);
/* make sure some data has arrived */
if (!FD_ISSET(socket, &readfds)) { /* it hasn't */
if (!recv_length) {
strcpy(recv_buffer, "");
// printf("%s\n", _("No data was received from host!"));
result = STATE_WARNING;
} else { /* this one failed, but previous ones worked */
recv_buffer[recv_length] = 0;
}
break;
} /* it has */
ssize_t recv_result =
recv(socket, recv_buffer + recv_length, (size_t)(recv_size - recv_length - 1), 0);
if (recv_result == -1) {
/* recv failed, bail out */
strcpy(recv_buffer + recv_length, "");
result = STATE_WARNING;
break;
}
if (recv_result == 0) {
/* end of file ? */
recv_buffer[recv_length] = 0;
break;
}
/* we got data! */
recv_length += recv_result;
if (recv_length >= recv_size - 1) {
/* buffer full, we're done */
recv_buffer[recv_size - 1] = 0;
break;
}
/* end if(!FD_ISSET(sd,&readfds)) */
}
close(socket);
return result;
}
/* connects to a host on a specified port, sends a string, and gets a
response */
mp_state_enum process_request(const char *server_address, const int server_port, const int proto,
const char *send_buffer, char *recv_buffer, const int recv_size) {
mp_state_enum result = STATE_OK;
int socket;
result = np_net_connect(server_address, server_port, &socket, proto);
if (result != STATE_OK) {
return STATE_CRITICAL;
}
result = send_request(socket, proto, send_buffer, recv_buffer, recv_size);
close(socket);
return result;
}
/* opens a tcp or udp connection to a remote host or local socket */
mp_state_enum np_net_connect(const char *host_name, int port, int *socketDescriptor,
const int proto) {
/* send back STATE_UNKOWN if there's an error
send back STATE_OK if we connect
send back STATE_CRITICAL if we can't connect.
Let upstream figure out what to send to the user. */
bool is_socket = (host_name[0] == '/');
int socktype = (proto == IPPROTO_UDP) ? SOCK_DGRAM : SOCK_STREAM;
struct addrinfo hints = {};
struct addrinfo *res = NULL;
int result;
/* as long as it doesn't start with a '/', it's assumed a host or ip */
if (!is_socket) {
memset(&hints, 0, sizeof(hints));
hints.ai_family = address_family;
hints.ai_protocol = proto;
hints.ai_socktype = socktype;
size_t len = strlen(host_name);
/* check for an [IPv6] address (and strip the brackets) */
if (len >= 2 && host_name[0] == '[' && host_name[len - 1] == ']') {
host_name++;
len -= 2;
}
char host[MAX_HOST_ADDRESS_LENGTH];
if (len >= sizeof(host)) {
return STATE_UNKNOWN;
}
memcpy(host, host_name, len);
host[len] = '\0';
char port_str[6];
snprintf(port_str, sizeof(port_str), "%d", port);
int getaddrinfo_err = getaddrinfo(host, port_str, &hints, &res);
if (getaddrinfo_err != 0) {
// printf("%s\n", gai_strerror(result));
return STATE_UNKNOWN;
}
struct addrinfo *addressPointer = res;
while (addressPointer) {
/* attempt to create a socket */
*socketDescriptor =
socket(addressPointer->ai_family, socktype, addressPointer->ai_protocol);
if (*socketDescriptor < 0) {
// printf("%s\n", _("Socket creation failed"));
freeaddrinfo(addressPointer);
return STATE_UNKNOWN;
}
/* attempt to open a connection */
result =
connect(*socketDescriptor, addressPointer->ai_addr, addressPointer->ai_addrlen);
if (result == 0) {
was_refused = false;
break;
}
if (result < 0) {
switch (errno) {
case ECONNREFUSED:
was_refused = true;
break;
}
}
close(*socketDescriptor);
addressPointer = addressPointer->ai_next;
}
freeaddrinfo(res);
} else {
/* else the hostname is interpreted as a path to a unix socket */
if (strlen(host_name) >= UNIX_PATH_MAX) {
die(STATE_UNKNOWN, _("Supplied path too long unix domain socket"));
}
struct sockaddr_un su = {};
su.sun_family = AF_UNIX;
strncpy(su.sun_path, host_name, UNIX_PATH_MAX);
*socketDescriptor = socket(PF_UNIX, SOCK_STREAM, 0);
if (*socketDescriptor < 0) {
die(STATE_UNKNOWN, _("Socket creation failed"));
}
result = connect(*socketDescriptor, (struct sockaddr *)&su, sizeof(su));
if (result < 0 && errno == ECONNREFUSED) {
was_refused = true;
}
}
if (result == 0) {
return STATE_OK;
}
if (was_refused) {
switch (econn_refuse_state) { /* a user-defined expected outcome */
case STATE_OK:
case STATE_WARNING: /* user wants WARN or OK on refusal, or... */
case STATE_CRITICAL: /* user did not set econn_refuse_state, or wanted critical */
if (is_socket) {
// printf("connect to file socket %s: %s\n", host_name, strerror(errno));
} else {
// printf("connect to address %s and port %d: %s\n", host_name, port,
// strerror(errno));
}
return STATE_CRITICAL;
break;
default: /* it's a logic error if we do not end up in STATE_(OK|WARNING|CRITICAL) */
return STATE_UNKNOWN;
break;
}
} else {
if (is_socket) {
// printf("connect to file socket %s: %s\n", host_name, strerror(errno));
} else {
// printf("connect to address %s and port %d: %s\n", host_name, port, strerror(errno));
}
return STATE_CRITICAL;
}
}
mp_state_enum send_request(const int socket, const int proto, const char *send_buffer,
char *recv_buffer, const int recv_size) {
mp_state_enum result = STATE_OK;
ssize_t send_result = send(socket, send_buffer, strlen(send_buffer), 0);
if (send_result < 0 || (size_t)send_result != strlen(send_buffer)) {
// printf("%s\n", _("Send failed"));
result = STATE_WARNING;
}
/* wait up to the number of seconds for socket timeout minus one
for data from the host */
struct timeval timestamp = {
.tv_sec = socket_timeout - 1,
.tv_usec = 0,
};
fd_set readfds;
FD_ZERO(&readfds);
FD_SET(socket, &readfds);
select(socket + 1, &readfds, NULL, NULL, ×tamp);
/* make sure some data has arrived */
if (!FD_ISSET(socket, &readfds)) {
strcpy(recv_buffer, "");
// printf("%s\n", _("No data was received from host!"));
result = STATE_WARNING;
} else {
ssize_t recv_result = recv(socket, recv_buffer, (size_t)(recv_size - 1), 0);
if (recv_result == -1) {
strcpy(recv_buffer, "");
if (proto != IPPROTO_TCP) {
// printf("%s\n", _("Receive failed"));
}
result = STATE_WARNING;
} else {
recv_buffer[recv_result] = 0;
}
/* die returned string */
recv_buffer[recv_size - 1] = 0;
}
return result;
}
bool is_host(const char *address) {
if (is_addr(address) || is_hostname(address)) {
return (true);
}
return (false);
}
void host_or_die(const char *str) {
if (!str || (!is_addr(str) && !is_hostname(str))) {
usage_va(_("Invalid hostname/address - %s"), str);
}
}
bool is_addr(const char *address) {
#ifdef USE_IPV6
if (address_family == AF_INET && is_inet_addr(address)) {
return true;
}
if (address_family == AF_INET6 && is_inet6_addr(address)) {
return true;
}
#else
if (is_inet_addr(address)) {
return true;
}
#endif
return false;
}
bool dns_lookup(const char *node_string, struct sockaddr_storage *ss, const int family) {
struct addrinfo hints;
memset(&hints, 0, sizeof(struct addrinfo));
hints.ai_family = family;
struct addrinfo *res;
int retval = getaddrinfo(node_string, NULL, &hints, &res);
if (retval != 0) {
return false;
}
if (ss != NULL) {
memcpy(ss, res->ai_addr, res->ai_addrlen);
}
freeaddrinfo(res);
return true;
}