1 /*****************************************************************************
3 * Monitoring check_curl plugin
6 * Copyright (c) 1999-2019 Monitoring Plugins Development Team
10 * This file contains the check_curl plugin
12 * This plugin tests the HTTP service on the specified host. It can test
13 * normal (http) and secure (https) servers, follow redirects, search for
14 * strings and regular expressions, check connection times, and report on
15 * certificate expiration times.
17 * This plugin uses functions from the curl library, see
20 * This program is free software: you can redistribute it and/or modify
21 * it under the terms of the GNU General Public License as published by
22 * the Free Software Foundation, either version 3 of the License, or
23 * (at your option) any later version.
25 * This program is distributed in the hope that it will be useful,
26 * but WITHOUT ANY WARRANTY; without even the implied warranty of
27 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
28 * GNU General Public License for more details.
30 * You should have received a copy of the GNU General Public License
31 * along with this program. If not, see <http://www.gnu.org/licenses/>.
34 *****************************************************************************/
35 const char *progname
= "check_curl";
37 const char *copyright
= "2006-2019";
38 const char *email
= "devel@monitoring-plugins.org";
45 #ifndef LIBCURL_PROTOCOL_HTTP
46 #error libcurl compiled without HTTP support, compiling check_curl plugin does not makes a lot of sense
49 #include "curl/curl.h"
50 #include "curl/easy.h"
52 #include "picohttpparser.h"
54 #include "uriparser/Uri.h"
56 #include <arpa/inet.h>
58 #if defined(HAVE_SSL) && defined(USE_OPENSSL)
59 #include <openssl/opensslv.h>
64 #define MAKE_LIBCURL_VERSION(major, minor, patch) ((major)*0x10000 + (minor)*0x100 + (patch))
66 #define DEFAULT_BUFFER_SIZE 2048
67 #define DEFAULT_SERVER_URL "/"
68 #define HTTP_EXPECT "HTTP/"
69 #define DEFAULT_MAX_REDIRS 15
70 #define INET_ADDR_MAX_SIZE INET6_ADDRSTRLEN
72 MAX_IPV4_HOSTLENGTH
= 255,
89 /* for buffers for header and body */
94 } curlhelp_write_curlbuf
;
96 /* for buffering the data sent in PUT */
101 } curlhelp_read_curlbuf
;
103 /* for parsing the HTTP status line */
105 int http_major
; /* major version of the protocol, always 1 (HTTP/0.9
106 * never reached the big internet most likely) */
107 int http_minor
; /* minor version of the protocol, usually 0 or 1 */
108 int http_code
; /* HTTP return code as in RFC 2145 */
109 int http_subcode
; /* Microsoft IIS extension, HTTP subcodes, see
110 * http://support.microsoft.com/kb/318380/en-us */
111 const char *msg
; /* the human readable message */
112 char *first_line
; /* a copy of the first line */
113 } curlhelp_statusline
;
115 /* to know the underlying SSL library used by libcurl */
116 typedef enum curlhelp_ssl_library
{
117 CURLHELP_SSL_LIBRARY_UNKNOWN
,
118 CURLHELP_SSL_LIBRARY_OPENSSL
,
119 CURLHELP_SSL_LIBRARY_LIBRESSL
,
120 CURLHELP_SSL_LIBRARY_GNUTLS
,
121 CURLHELP_SSL_LIBRARY_NSS
122 } curlhelp_ssl_library
;
130 regmatch_t pmatch
[REGS
];
131 char regexp
[MAX_RE_SIZE
];
132 int cflags
= REG_NOSUB
| REG_EXTENDED
| REG_NEWLINE
;
134 int invert_regex
= 0;
136 char *server_address
= NULL
;
137 char *host_name
= NULL
;
138 char *server_url
= 0;
139 char server_ip
[DEFAULT_BUFFER_SIZE
];
140 struct curl_slist
*server_ips
= NULL
;
141 int specify_port
= FALSE
;
142 unsigned short server_port
= HTTP_PORT
;
143 unsigned short virtual_port
= 0;
144 int host_name_length
;
145 char output_header_search
[30] = "";
146 char output_string_search
[30] = "";
147 char *warning_thresholds
= NULL
;
148 char *critical_thresholds
= NULL
;
149 int days_till_exp_warn
, days_till_exp_crit
;
151 char user_agent
[DEFAULT_BUFFER_SIZE
];
153 int show_extended_perfdata
= FALSE
;
154 int show_body
= FALSE
;
155 int min_page_len
= 0;
156 int max_page_len
= 0;
158 int max_depth
= DEFAULT_MAX_REDIRS
;
159 char *http_method
= NULL
;
160 char *http_post_data
= NULL
;
161 char *http_content_type
= NULL
;
163 struct curl_slist
*header_list
= NULL
;
164 curlhelp_write_curlbuf body_buf
;
165 curlhelp_write_curlbuf header_buf
;
166 curlhelp_statusline status_line
;
167 curlhelp_read_curlbuf put_buf
;
168 char http_header
[DEFAULT_BUFFER_SIZE
];
170 long socket_timeout
= DEFAULT_SOCKET_TIMEOUT
;
173 double time_appconnect
;
175 double time_firstbyte
;
176 char errbuf
[CURL_ERROR_SIZE
+1];
178 char url
[DEFAULT_BUFFER_SIZE
];
179 char msg
[DEFAULT_BUFFER_SIZE
];
180 char perfstring
[DEFAULT_BUFFER_SIZE
];
181 char header_expect
[MAX_INPUT_BUFFER
] = "";
182 char string_expect
[MAX_INPUT_BUFFER
] = "";
183 char server_expect
[MAX_INPUT_BUFFER
] = HTTP_EXPECT
;
184 int server_expect_yn
= 0;
185 char user_auth
[MAX_INPUT_BUFFER
] = "";
186 char proxy_auth
[MAX_INPUT_BUFFER
] = "";
187 char **http_opt_headers
;
188 int http_opt_headers_count
= 0;
189 int display_html
= FALSE
;
190 int onredirect
= STATE_OK
;
191 int followmethod
= FOLLOW_HTTP_CURL
;
192 int followsticky
= STICKY_NONE
;
195 int check_cert
= FALSE
;
197 struct curl_slist
* to_info
;
198 struct curl_certinfo
* to_certinfo
;
200 cert_ptr_union cert_ptr
;
201 int ssl_version
= CURL_SSLVERSION_DEFAULT
;
202 char *client_cert
= NULL
;
203 char *client_privkey
= NULL
;
204 char *ca_cert
= NULL
;
205 int verify_peer_and_host
= FALSE
;
206 int is_openssl_callback
= FALSE
;
207 #if defined(HAVE_SSL) && defined(USE_OPENSSL)
209 #endif /* defined(HAVE_SSL) && defined(USE_OPENSSL) */
211 int maximum_age
= -1;
212 int address_family
= AF_UNSPEC
;
213 curlhelp_ssl_library ssl_library
= CURLHELP_SSL_LIBRARY_UNKNOWN
;
214 int curl_http_version
= CURL_HTTP_VERSION_NONE
;
215 int automatic_decompression
= FALSE
;
217 int process_arguments (int, char**);
218 void handle_curl_option_return_code (CURLcode res
, const char* option
);
219 int check_http (void);
220 void redir (curlhelp_write_curlbuf
*);
221 char *perfd_time (double microsec
);
222 char *perfd_time_connect (double microsec
);
223 char *perfd_time_ssl (double microsec
);
224 char *perfd_time_firstbyte (double microsec
);
225 char *perfd_time_headers (double microsec
);
226 char *perfd_time_transfer (double microsec
);
227 char *perfd_size (int page_len
);
228 void print_help (void);
229 void print_usage (void);
230 void print_curl_version (void);
231 int curlhelp_initwritebuffer (curlhelp_write_curlbuf
*);
232 int curlhelp_buffer_write_callback (void*, size_t , size_t , void*);
233 void curlhelp_freewritebuffer (curlhelp_write_curlbuf
*);
234 int curlhelp_initreadbuffer (curlhelp_read_curlbuf
*, const char *, size_t);
235 int curlhelp_buffer_read_callback (void *, size_t , size_t , void *);
236 void curlhelp_freereadbuffer (curlhelp_read_curlbuf
*);
237 curlhelp_ssl_library
curlhelp_get_ssl_library (CURL
*);
238 const char* curlhelp_get_ssl_library_string (curlhelp_ssl_library
);
239 int net_noopenssl_check_certificate (cert_ptr_union
*, int, int);
241 int curlhelp_parse_statusline (const char*, curlhelp_statusline
*);
242 void curlhelp_free_statusline (curlhelp_statusline
*);
243 char *get_header_value (const struct phr_header
* headers
, const size_t nof_headers
, const char* header
);
244 int check_document_dates (const curlhelp_write_curlbuf
*, char (*msg
)[DEFAULT_BUFFER_SIZE
]);
245 int get_content_length (const curlhelp_write_curlbuf
* header_buf
, const curlhelp_write_curlbuf
* body_buf
);
247 #if defined(HAVE_SSL) && defined(USE_OPENSSL)
248 int np_net_ssl_check_certificate(X509
*certificate
, int days_till_exp_warn
, int days_till_exp_crit
);
249 #endif /* defined(HAVE_SSL) && defined(USE_OPENSSL) */
251 void remove_newlines (char *);
252 void test_file (char *);
255 main (int argc
, char **argv
)
257 int result
= STATE_UNKNOWN
;
259 setlocale (LC_ALL
, "");
260 bindtextdomain (PACKAGE
, LOCALEDIR
);
261 textdomain (PACKAGE
);
263 /* Parse extra opts if any */
264 argv
= np_extra_opts (&argc
, argv
, progname
);
267 snprintf( user_agent
, DEFAULT_BUFFER_SIZE
, "%s/v%s (monitoring-plugins %s, %s)",
268 progname
, NP_VERSION
, VERSION
, curl_version());
270 /* parse arguments */
271 if (process_arguments (argc
, argv
) == ERROR
)
272 usage4 (_("Could not parse arguments"));
274 if (display_html
== TRUE
)
275 printf ("<A HREF=\"%s://%s:%d%s\" target=\"_blank\">",
276 use_ssl
? "https" : "http",
277 host_name
? host_name
: server_address
,
278 virtual_port
? virtual_port
: server_port
,
281 result
= check_http ();
288 int verify_callback(int preverify_ok
, X509_STORE_CTX
*x509_ctx
)
290 /* TODO: we get all certificates of the chain, so which ones
292 * TODO: is the last certificate always the server certificate?
294 cert
= X509_STORE_CTX_get_current_cert(x509_ctx
);
295 #if OPENSSL_VERSION_NUMBER >= 0x10100000L
299 puts("* SSL verify callback with certificate:");
300 X509_NAME
*subject
, *issuer
;
301 printf("* issuer:\n");
302 issuer
= X509_get_issuer_name( cert
);
303 X509_NAME_print_ex_fp(stdout
, issuer
, 5, XN_FLAG_MULTILINE
);
304 printf("* curl verify_callback:\n* subject:\n");
305 subject
= X509_get_subject_name( cert
);
306 X509_NAME_print_ex_fp(stdout
, subject
, 5, XN_FLAG_MULTILINE
);
312 CURLcode
sslctxfun(CURL
*curl
, SSL_CTX
*sslctx
, void *parm
)
314 SSL_CTX_set_verify(sslctx
, SSL_VERIFY_PEER
, verify_callback
);
319 #endif /* USE_OPENSSL */
320 #endif /* HAVE_SSL */
322 /* returns a string "HTTP/1.x" or "HTTP/2" */
323 static char *string_statuscode (int major
, int minor
)
329 snprintf (buf
, sizeof (buf
), "HTTP/%d.%d", major
, minor
);
333 snprintf (buf
, sizeof (buf
), "HTTP/%d", major
);
336 /* assuming here HTTP/N with N>=4 */
337 snprintf (buf
, sizeof (buf
), "HTTP/%d", major
);
344 /* Checks if the server 'reply' is one of the expected 'statuscodes' */
346 expected_statuscode (const char *reply
, const char *statuscodes
)
348 char *expected
, *code
;
351 if ((expected
= strdup (statuscodes
)) == NULL
)
352 die (STATE_UNKNOWN
, _("HTTP UNKNOWN - Memory allocation error\n"));
354 for (code
= strtok (expected
, ","); code
!= NULL
; code
= strtok (NULL
, ","))
355 if (strstr (reply
, code
) != NULL
) {
365 handle_curl_option_return_code (CURLcode res
, const char* option
)
367 if (res
!= CURLE_OK
) {
368 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("Error while setting cURL option '%s': cURL returned %d - %s"),
369 option
, res
, curl_easy_strerror(res
));
370 die (STATE_CRITICAL
, "HTTP CRITICAL - %s\n", msg
);
375 lookup_host (const char *host
, char *buf
, size_t buflen
)
377 struct addrinfo hints
, *res
, *result
;
381 memset (&hints
, 0, sizeof (hints
));
382 hints
.ai_family
= address_family
;
383 hints
.ai_socktype
= SOCK_STREAM
;
384 hints
.ai_flags
|= AI_CANONNAME
;
386 errcode
= getaddrinfo (host
, NULL
, &hints
, &result
);
393 inet_ntop (res
->ai_family
, res
->ai_addr
->sa_data
, buf
, buflen
);
394 switch (res
->ai_family
) {
396 ptr
= &((struct sockaddr_in
*) res
->ai_addr
)->sin_addr
;
399 ptr
= &((struct sockaddr_in6
*) res
->ai_addr
)->sin6_addr
;
402 inet_ntop (res
->ai_family
, ptr
, buf
, buflen
);
404 printf ("* getaddrinfo IPv%d address: %s\n",
405 res
->ai_family
== PF_INET6
? 6 : 4, buf
);
409 freeaddrinfo(result
);
417 int result
= STATE_OK
;
420 char *force_host_header
= NULL
;
421 struct curl_slist
*host
= NULL
;
423 char dnscache
[DEFAULT_BUFFER_SIZE
];
425 /* initialize curl */
426 if (curl_global_init (CURL_GLOBAL_DEFAULT
) != CURLE_OK
)
427 die (STATE_UNKNOWN
, "HTTP UNKNOWN - curl_global_init failed\n");
429 if ((curl
= curl_easy_init()) == NULL
)
430 die (STATE_UNKNOWN
, "HTTP UNKNOWN - curl_easy_init failed\n");
433 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_VERBOSE
, TRUE
), "CURLOPT_VERBOSE");
435 /* print everything on stdout like check_http would do */
436 handle_curl_option_return_code (curl_easy_setopt(curl
, CURLOPT_STDERR
, stdout
), "CURLOPT_STDERR");
438 if (automatic_decompression
)
439 #if LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 21, 6)
440 handle_curl_option_return_code (curl_easy_setopt(curl
, CURLOPT_ACCEPT_ENCODING
, ""), "CURLOPT_ACCEPT_ENCODING");
442 handle_curl_option_return_code (curl_easy_setopt(curl
, CURLOPT_ENCODING
, ""), "CURLOPT_ENCODING");
443 #endif /* LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 21, 6) */
445 /* initialize buffer for body of the answer */
446 if (curlhelp_initwritebuffer(&body_buf
) < 0)
447 die (STATE_UNKNOWN
, "HTTP CRITICAL - out of memory allocating buffer for body\n");
448 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_WRITEFUNCTION
, (curl_write_callback
)curlhelp_buffer_write_callback
), "CURLOPT_WRITEFUNCTION");
449 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_WRITEDATA
, (void *)&body_buf
), "CURLOPT_WRITEDATA");
451 /* initialize buffer for header of the answer */
452 if (curlhelp_initwritebuffer( &header_buf
) < 0)
453 die (STATE_UNKNOWN
, "HTTP CRITICAL - out of memory allocating buffer for header\n" );
454 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_HEADERFUNCTION
, (curl_write_callback
)curlhelp_buffer_write_callback
), "CURLOPT_HEADERFUNCTION");
455 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_WRITEHEADER
, (void *)&header_buf
), "CURLOPT_WRITEHEADER");
457 /* set the error buffer */
458 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_ERRORBUFFER
, errbuf
), "CURLOPT_ERRORBUFFER");
461 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_CONNECTTIMEOUT
, socket_timeout
), "CURLOPT_CONNECTTIMEOUT");
462 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_TIMEOUT
, socket_timeout
), "CURLOPT_TIMEOUT");
464 // fill dns resolve cache to make curl connect to the given server_address instead of the host_name, only required for ssl, because we use the host_name later on to make SNI happy
465 if(use_ssl
&& host_name
!= NULL
) {
466 if ( (res
=lookup_host (server_address
, addrstr
, 100)) != 0) {
467 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("Unable to lookup IP address for '%s': getaddrinfo returned %d - %s"),
468 server_address
, res
, gai_strerror (res
));
469 die (STATE_CRITICAL
, "HTTP CRITICAL - %s\n", msg
);
471 snprintf (dnscache
, DEFAULT_BUFFER_SIZE
, "%s:%d:%s", host_name
, server_port
, addrstr
);
472 host
= curl_slist_append(NULL
, dnscache
);
473 curl_easy_setopt(curl
, CURLOPT_RESOLVE
, host
);
475 printf ("* curl CURLOPT_RESOLVE: %s\n", dnscache
);
478 /* compose URL: use the address we want to connect to, set Host: header later */
479 snprintf (url
, DEFAULT_BUFFER_SIZE
, "%s://%s:%d%s",
480 use_ssl
? "https" : "http",
481 use_ssl
& host_name
!= NULL
? host_name
: server_address
,
487 printf ("* curl CURLOPT_URL: %s\n", url
);
488 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_URL
, url
), "CURLOPT_URL");
490 /* extract proxy information for legacy proxy https requests */
491 if (!strcmp(http_method
, "CONNECT") || strstr(server_url
, "http") == server_url
) {
492 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_PROXY
, server_address
), "CURLOPT_PROXY");
493 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_PROXYPORT
, (long)server_port
), "CURLOPT_PROXYPORT");
495 printf ("* curl CURLOPT_PROXY: %s:%d\n", server_address
, server_port
);
497 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_URL
, server_url
), "CURLOPT_URL");
500 /* disable body for HEAD request */
501 if (http_method
&& !strcmp (http_method
, "HEAD" )) {
505 /* set HTTP protocol version */
506 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_HTTP_VERSION
, curl_http_version
), "CURLOPT_HTTP_VERSION");
508 /* set HTTP method */
510 if (!strcmp(http_method
, "POST"))
511 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_POST
, 1), "CURLOPT_POST");
512 else if (!strcmp(http_method
, "PUT"))
513 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_UPLOAD
, 1), "CURLOPT_UPLOAD");
515 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_CUSTOMREQUEST
, http_method
), "CURLOPT_CUSTOMREQUEST");
518 /* check if Host header is explicitly set in options */
519 if (http_opt_headers_count
) {
520 for (i
= 0; i
< http_opt_headers_count
; i
++) {
521 if (strncmp(http_opt_headers
[i
], "Host:", 5) == 0) {
522 force_host_header
= http_opt_headers
[i
];
527 /* set hostname (virtual hosts), not needed if CURLOPT_CONNECT_TO is used, but left in anyway */
528 if(host_name
!= NULL
&& force_host_header
== NULL
) {
529 if((virtual_port
!= HTTP_PORT
&& !use_ssl
) || (virtual_port
!= HTTPS_PORT
&& use_ssl
)) {
530 snprintf(http_header
, DEFAULT_BUFFER_SIZE
, "Host: %s:%d", host_name
, virtual_port
);
532 snprintf(http_header
, DEFAULT_BUFFER_SIZE
, "Host: %s", host_name
);
534 header_list
= curl_slist_append (header_list
, http_header
);
537 /* always close connection, be nice to servers */
538 snprintf (http_header
, DEFAULT_BUFFER_SIZE
, "Connection: close");
539 header_list
= curl_slist_append (header_list
, http_header
);
541 /* attach additional headers supplied by the user */
542 /* optionally send any other header tag */
543 if (http_opt_headers_count
) {
544 for (i
= 0; i
< http_opt_headers_count
; i
++) {
545 header_list
= curl_slist_append (header_list
, http_opt_headers
[i
]);
547 /* This cannot be free'd here because a redirection will then try to access this and segfault */
548 /* Covered in a testcase in tests/check_http.t */
549 /* free(http_opt_headers); */
552 /* set HTTP headers */
553 handle_curl_option_return_code (curl_easy_setopt( curl
, CURLOPT_HTTPHEADER
, header_list
), "CURLOPT_HTTPHEADER");
555 #ifdef LIBCURL_FEATURE_SSL
557 /* set SSL version, warn about unsecure or unsupported versions */
559 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_SSLVERSION
, ssl_version
), "CURLOPT_SSLVERSION");
562 /* client certificate and key to present to server (SSL) */
564 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_SSLCERT
, client_cert
), "CURLOPT_SSLCERT");
566 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_SSLKEY
, client_privkey
), "CURLOPT_SSLKEY");
568 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_CAINFO
, ca_cert
), "CURLOPT_CAINFO");
570 if (ca_cert
|| verify_peer_and_host
) {
571 /* per default if we have a CA verify both the peer and the
572 * hostname in the certificate, can be switched off later */
573 handle_curl_option_return_code (curl_easy_setopt( curl
, CURLOPT_SSL_VERIFYPEER
, 1), "CURLOPT_SSL_VERIFYPEER");
574 handle_curl_option_return_code (curl_easy_setopt( curl
, CURLOPT_SSL_VERIFYHOST
, 2), "CURLOPT_SSL_VERIFYHOST");
576 /* backward-compatible behaviour, be tolerant in checks
577 * TODO: depending on more options have aspects we want
578 * to be less tolerant about ssl verfications
580 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_SSL_VERIFYPEER
, 0), "CURLOPT_SSL_VERIFYPEER");
581 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_SSL_VERIFYHOST
, 0), "CURLOPT_SSL_VERIFYHOST");
584 /* detect SSL library used by libcurl */
585 ssl_library
= curlhelp_get_ssl_library (curl
);
587 /* try hard to get a stack of certificates to verify against */
589 #if LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 19, 1)
590 /* inform curl to report back certificates */
591 switch (ssl_library
) {
592 case CURLHELP_SSL_LIBRARY_OPENSSL
:
593 case CURLHELP_SSL_LIBRARY_LIBRESSL
:
594 /* set callback to extract certificate with OpenSSL context function (works with
595 * OpenSSL-style libraries only!) */
597 /* libcurl and monitoring plugins built with OpenSSL, good */
598 handle_curl_option_return_code (curl_easy_setopt(curl
, CURLOPT_SSL_CTX_FUNCTION
, sslctxfun
), "CURLOPT_SSL_CTX_FUNCTION");
599 is_openssl_callback
= TRUE
;
600 #else /* USE_OPENSSL */
601 #endif /* USE_OPENSSL */
602 /* libcurl is built with OpenSSL, monitoring plugins, so falling
603 * back to manually extracting certificate information */
604 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_CERTINFO
, 1L), "CURLOPT_CERTINFO");
607 case CURLHELP_SSL_LIBRARY_NSS
:
608 #if LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 34, 0)
609 /* NSS: support for CERTINFO is implemented since 7.34.0 */
610 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_CERTINFO
, 1L), "CURLOPT_CERTINFO");
611 #else /* LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 34, 0) */
612 die (STATE_CRITICAL
, "HTTP CRITICAL - Cannot retrieve certificates (libcurl linked with SSL library '%s' is too old)\n", curlhelp_get_ssl_library_string (ssl_library
));
613 #endif /* LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 34, 0) */
616 case CURLHELP_SSL_LIBRARY_GNUTLS
:
617 #if LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 42, 0)
618 /* GnuTLS: support for CERTINFO is implemented since 7.42.0 */
619 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_CERTINFO
, 1L), "CURLOPT_CERTINFO");
620 #else /* LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 42, 0) */
621 die (STATE_CRITICAL
, "HTTP CRITICAL - Cannot retrieve certificates (libcurl linked with SSL library '%s' is too old)\n", curlhelp_get_ssl_library_string (ssl_library
));
622 #endif /* LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 42, 0) */
625 case CURLHELP_SSL_LIBRARY_UNKNOWN
:
627 die (STATE_CRITICAL
, "HTTP CRITICAL - Cannot retrieve certificates (unknown SSL library '%s', must implement first)\n", curlhelp_get_ssl_library_string (ssl_library
));
630 #else /* LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 19, 1) */
631 /* old libcurl, our only hope is OpenSSL, otherwise we are out of luck */
632 if (ssl_library
== CURLHELP_SSL_LIBRARY_OPENSSL
|| ssl_library
== CURLHELP_SSL_LIBRARY_LIBRESSL
)
633 handle_curl_option_return_code (curl_easy_setopt(curl
, CURLOPT_SSL_CTX_FUNCTION
, sslctxfun
), "CURLOPT_SSL_CTX_FUNCTION");
635 die (STATE_CRITICAL
, "HTTP CRITICAL - Cannot retrieve certificates (no CURLOPT_SSL_CTX_FUNCTION, no OpenSSL library or libcurl too old and has no CURLOPT_CERTINFO)\n");
636 #endif /* LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 19, 1) */
639 #endif /* LIBCURL_FEATURE_SSL */
641 /* set default or user-given user agent identification */
642 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_USERAGENT
, user_agent
), "CURLOPT_USERAGENT");
644 /* proxy-authentication */
645 if (strcmp(proxy_auth
, ""))
646 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_PROXYUSERPWD
, proxy_auth
), "CURLOPT_PROXYUSERPWD");
649 if (strcmp(user_auth
, ""))
650 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_USERPWD
, user_auth
), "CURLOPT_USERPWD");
652 /* TODO: parameter auth method, bitfield of following methods:
653 * CURLAUTH_BASIC (default)
660 * convenience tokens for typical sets of methods:
661 * CURLAUTH_ANYSAFE: most secure, without BASIC
662 * or CURLAUTH_ANY: most secure, even BASIC if necessary
664 * handle_curl_option_return_code (curl_easy_setopt( curl, CURLOPT_HTTPAUTH, (long)CURLAUTH_DIGEST ), "CURLOPT_HTTPAUTH");
667 /* handle redirections */
668 if (onredirect
== STATE_DEPENDENT
) {
669 if( followmethod
== FOLLOW_LIBCURL
) {
670 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_FOLLOWLOCATION
, 1), "CURLOPT_FOLLOWLOCATION");
672 /* default -1 is infinite, not good, could lead to zombie plugins!
673 Setting it to one bigger than maximal limit to handle errors nicely below
675 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_MAXREDIRS
, max_depth
+1), "CURLOPT_MAXREDIRS");
677 /* for now allow only http and https (we are a http(s) check plugin in the end) */
678 #if LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 19, 4)
679 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_REDIR_PROTOCOLS
, CURLPROTO_HTTP
| CURLPROTO_HTTPS
), "CURLOPT_REDIRECT_PROTOCOLS");
680 #endif /* LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 19, 4) */
682 /* TODO: handle the following aspects of redirection, make them
683 * command line options too later:
684 CURLOPT_POSTREDIR: method switch
685 CURLINFO_REDIRECT_URL: custom redirect option
686 CURLOPT_REDIRECT_PROTOCOLS: allow people to step outside safe protocols
687 CURLINFO_REDIRECT_COUNT: get the number of redirects, print it, maybe a range option here is nice like for expected page size?
690 /* old style redirection is handled below */
696 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_NOBODY
, 1), "CURLOPT_NOBODY");
698 /* IPv4 or IPv6 forced DNS resolution */
699 if (address_family
== AF_UNSPEC
)
700 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_IPRESOLVE
, CURL_IPRESOLVE_WHATEVER
), "CURLOPT_IPRESOLVE(CURL_IPRESOLVE_WHATEVER)");
701 else if (address_family
== AF_INET
)
702 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_IPRESOLVE
, CURL_IPRESOLVE_V4
), "CURLOPT_IPRESOLVE(CURL_IPRESOLVE_V4)");
703 #if defined (USE_IPV6) && defined (LIBCURL_FEATURE_IPV6)
704 else if (address_family
== AF_INET6
)
705 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_IPRESOLVE
, CURL_IPRESOLVE_V6
), "CURLOPT_IPRESOLVE(CURL_IPRESOLVE_V6)");
708 /* either send http POST data (any data, not only POST)*/
709 if (!strcmp(http_method
, "POST") ||!strcmp(http_method
, "PUT")) {
710 /* set content of payload for POST and PUT */
711 if (http_content_type
) {
712 snprintf (http_header
, DEFAULT_BUFFER_SIZE
, "Content-Type: %s", http_content_type
);
713 header_list
= curl_slist_append (header_list
, http_header
);
715 /* NULL indicates "HTTP Continue" in libcurl, provide an empty string
716 * in case of no POST/PUT data */
719 if (!strcmp(http_method
, "POST")) {
720 /* POST method, set payload with CURLOPT_POSTFIELDS */
721 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_POSTFIELDS
, http_post_data
), "CURLOPT_POSTFIELDS");
722 } else if (!strcmp(http_method
, "PUT")) {
723 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_READFUNCTION
, (curl_read_callback
)curlhelp_buffer_read_callback
), "CURLOPT_READFUNCTION");
724 curlhelp_initreadbuffer (&put_buf
, http_post_data
, strlen (http_post_data
));
725 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_READDATA
, (void *)&put_buf
), "CURLOPT_READDATA");
726 handle_curl_option_return_code (curl_easy_setopt (curl
, CURLOPT_INFILESIZE
, (curl_off_t
)strlen (http_post_data
)), "CURLOPT_INFILESIZE");
731 res
= curl_easy_perform(curl
);
733 if (verbose
>=2 && http_post_data
)
734 printf ("**** REQUEST CONTENT ****\n%s\n", http_post_data
);
736 /* free header and server IP resolve lists, we don't need it anymore */
737 curl_slist_free_all (header_list
); header_list
= NULL
;
738 curl_slist_free_all (server_ips
); server_ips
= NULL
;
740 /* Curl errors, result in critical Nagios state */
741 if (res
!= CURLE_OK
) {
742 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("Invalid HTTP response received from host on port %d: cURL returned %d - %s"),
743 server_port
, res
, errbuf
[0] ? errbuf
: curl_easy_strerror(res
));
744 die (STATE_CRITICAL
, "HTTP CRITICAL - %s\n", msg
);
747 /* certificate checks */
748 #ifdef LIBCURL_FEATURE_SSL
749 if (use_ssl
== TRUE
) {
750 if (check_cert
== TRUE
) {
751 if (is_openssl_callback
) {
753 /* check certificate with OpenSSL functions, curl has been built against OpenSSL
754 * and we actually have OpenSSL in the monitoring tools
756 result
= np_net_ssl_check_certificate(cert
, days_till_exp_warn
, days_till_exp_crit
);
758 #else /* USE_OPENSSL */
759 die (STATE_CRITICAL
, "HTTP CRITICAL - Cannot retrieve certificates - OpenSSL callback used and not linked against OpenSSL\n");
760 #endif /* USE_OPENSSL */
763 struct curl_slist
*slist
;
765 cert_ptr
.to_info
= NULL
;
766 res
= curl_easy_getinfo (curl
, CURLINFO_CERTINFO
, &cert_ptr
.to_info
);
767 if (!res
&& cert_ptr
.to_info
) {
769 /* We have no OpenSSL in libcurl, but we can use OpenSSL for X509 cert parsing
770 * We only check the first certificate and assume it's the one of the server
772 const char* raw_cert
= NULL
;
773 for (i
= 0; i
< cert_ptr
.to_certinfo
->num_of_certs
; i
++) {
774 for (slist
= cert_ptr
.to_certinfo
->certinfo
[i
]; slist
; slist
= slist
->next
) {
776 printf ("%d ** %s\n", i
, slist
->data
);
777 if (strncmp (slist
->data
, "Cert:", 5) == 0) {
778 raw_cert
= &slist
->data
[5];
785 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("Cannot retrieve certificates from CERTINFO information - certificate data was empty"));
786 die (STATE_CRITICAL
, "HTTP CRITICAL - %s\n", msg
);
788 BIO
* cert_BIO
= BIO_new (BIO_s_mem());
789 BIO_write (cert_BIO
, raw_cert
, strlen(raw_cert
));
790 cert
= PEM_read_bio_X509 (cert_BIO
, NULL
, NULL
, NULL
);
792 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("Cannot read certificate from CERTINFO information - BIO error"));
793 die (STATE_CRITICAL
, "HTTP CRITICAL - %s\n", msg
);
796 result
= np_net_ssl_check_certificate(cert
, days_till_exp_warn
, days_till_exp_crit
);
798 #else /* USE_OPENSSL */
799 /* We assume we don't have OpenSSL and np_net_ssl_check_certificate at our disposal,
800 * so we use the libcurl CURLINFO data
802 result
= net_noopenssl_check_certificate(&cert_ptr
, days_till_exp_warn
, days_till_exp_crit
);
804 #endif /* USE_OPENSSL */
806 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("Cannot retrieve certificates - cURL returned %d - %s"),
807 res
, curl_easy_strerror(res
));
808 die (STATE_CRITICAL
, "HTTP CRITICAL - %s\n", msg
);
813 #endif /* LIBCURL_FEATURE_SSL */
815 /* we got the data and we executed the request in a given time, so we can append
816 * performance data to the answer always
818 handle_curl_option_return_code (curl_easy_getinfo (curl
, CURLINFO_TOTAL_TIME
, &total_time
), "CURLINFO_TOTAL_TIME");
819 page_len
= get_content_length(&header_buf
, &body_buf
);
820 if(show_extended_perfdata
) {
821 handle_curl_option_return_code (curl_easy_getinfo(curl
, CURLINFO_CONNECT_TIME
, &time_connect
), "CURLINFO_CONNECT_TIME");
822 handle_curl_option_return_code (curl_easy_getinfo(curl
, CURLINFO_APPCONNECT_TIME
, &time_appconnect
), "CURLINFO_APPCONNECT_TIME");
823 handle_curl_option_return_code (curl_easy_getinfo(curl
, CURLINFO_PRETRANSFER_TIME
, &time_headers
), "CURLINFO_PRETRANSFER_TIME");
824 handle_curl_option_return_code (curl_easy_getinfo(curl
, CURLINFO_STARTTRANSFER_TIME
, &time_firstbyte
), "CURLINFO_STARTTRANSFER_TIME");
825 snprintf(perfstring
, DEFAULT_BUFFER_SIZE
, "%s %s %s %s %s %s %s",
826 perfd_time(total_time
),
827 perfd_size(page_len
),
828 perfd_time_connect(time_connect
),
829 use_ssl
== TRUE
? perfd_time_ssl (time_appconnect
-time_connect
) : "",
830 perfd_time_headers(time_headers
- time_appconnect
),
831 perfd_time_firstbyte(time_firstbyte
- time_headers
),
832 perfd_time_transfer(total_time
-time_firstbyte
)
835 snprintf(perfstring
, DEFAULT_BUFFER_SIZE
, "%s %s",
836 perfd_time(total_time
),
841 /* return a CRITICAL status if we couldn't read any data */
842 if (strlen(header_buf
.buf
) == 0 && strlen(body_buf
.buf
) == 0)
843 die (STATE_CRITICAL
, _("HTTP CRITICAL - No header received from host\n"));
845 /* get status line of answer, check sanity of HTTP code */
846 if (curlhelp_parse_statusline (header_buf
.buf
, &status_line
) < 0) {
847 snprintf (msg
, DEFAULT_BUFFER_SIZE
, "Unparsable status line in %.3g seconds response time|%s\n",
848 total_time
, perfstring
);
849 /* we cannot know the major/minor version here for sure as we cannot parse the first line */
850 die (STATE_CRITICAL
, "HTTP CRITICAL HTTP/x.x %ld unknown - %s", code
, msg
);
853 /* get result code from cURL */
854 handle_curl_option_return_code (curl_easy_getinfo (curl
, CURLINFO_RESPONSE_CODE
, &code
), "CURLINFO_RESPONSE_CODE");
856 printf ("* curl CURLINFO_RESPONSE_CODE is %ld\n", code
);
858 /* print status line, header, body if verbose */
860 printf ("**** HEADER ****\n%s\n**** CONTENT ****\n%s\n", header_buf
.buf
,
861 (no_body
? " [[ skipped ]]" : body_buf
.buf
));
864 /* make sure the status line matches the response we are looking for */
865 if (!expected_statuscode(status_line
.first_line
, server_expect
)) {
866 if (server_port
== HTTP_PORT
)
867 snprintf(msg
, DEFAULT_BUFFER_SIZE
, _("Invalid HTTP response received from host: %s\n"), status_line
.first_line
);
869 snprintf(msg
, DEFAULT_BUFFER_SIZE
, _("Invalid HTTP response received from host on port %d: %s\n"), server_port
, status_line
.first_line
);
870 die (STATE_CRITICAL
, "HTTP CRITICAL - %s%s%s", msg
,
871 show_body
? "\n" : "",
872 show_body
? body_buf
.buf
: "");
875 if( server_expect_yn
) {
876 snprintf(msg
, DEFAULT_BUFFER_SIZE
, _("Status line output matched \"%s\" - "), server_expect
);
882 /* illegal return codes result in a critical state */
883 if (code
>= 600 || code
< 100) {
884 die (STATE_CRITICAL
, _("HTTP CRITICAL: Invalid Status (%d, %.40s)\n"), status_line
.http_code
, status_line
.msg
);
885 /* server errors result in a critical state */
886 } else if (code
>= 500) {
887 result
= STATE_CRITICAL
;
888 /* client errors result in a warning state */
889 } else if (code
>= 400) {
890 result
= STATE_WARNING
;
891 /* check redirected page if specified */
892 } else if (code
>= 300) {
893 if (onredirect
== STATE_DEPENDENT
) {
894 if( followmethod
== FOLLOW_LIBCURL
) {
895 code
= status_line
.http_code
;
897 /* old check_http style redirection, if we come
898 * back here, we are in the same status as with
904 /* this is a specific code in the command line to
905 * be returned when a redirection is encoutered
908 result
= max_state_alt (onredirect
, result
);
909 /* all other codes are considered ok */
915 /* libcurl redirection internally, handle error states here */
916 if( followmethod
== FOLLOW_LIBCURL
) {
917 handle_curl_option_return_code (curl_easy_getinfo (curl
, CURLINFO_REDIRECT_COUNT
, &redir_depth
), "CURLINFO_REDIRECT_COUNT");
919 printf(_("* curl LIBINFO_REDIRECT_COUNT is %d\n"), redir_depth
);
920 if (redir_depth
> max_depth
) {
921 snprintf (msg
, DEFAULT_BUFFER_SIZE
, "maximum redirection depth %d exceeded in libcurl",
923 die (STATE_WARNING
, "HTTP WARNING - %s", msg
);
927 /* check status codes, set exit status accordingly */
928 if( status_line
.http_code
!= code
) {
929 die (STATE_CRITICAL
, _("HTTP CRITICAL %s %d %s - different HTTP codes (cUrl has %ld)\n"),
930 string_statuscode (status_line
.http_major
, status_line
.http_minor
),
931 status_line
.http_code
, status_line
.msg
, code
);
934 if (maximum_age
>= 0) {
935 result
= max_state_alt(check_document_dates(&header_buf
, &msg
), result
);
938 /* Page and Header content checks go here */
940 if (strlen (header_expect
)) {
941 if (!strstr (header_buf
.buf
, header_expect
)) {
942 strncpy(&output_header_search
[0],header_expect
,sizeof(output_header_search
));
943 if(output_header_search
[sizeof(output_header_search
)-1]!='\0') {
944 bcopy("...",&output_header_search
[sizeof(output_header_search
)-4],4);
946 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("%sheader '%s' not found on '%s://%s:%d%s', "), msg
, output_header_search
, use_ssl
? "https" : "http", host_name
? host_name
: server_address
, server_port
, server_url
);
947 result
= STATE_CRITICAL
;
951 if (strlen (string_expect
)) {
952 if (!strstr (body_buf
.buf
, string_expect
)) {
953 strncpy(&output_string_search
[0],string_expect
,sizeof(output_string_search
));
954 if(output_string_search
[sizeof(output_string_search
)-1]!='\0') {
955 bcopy("...",&output_string_search
[sizeof(output_string_search
)-4],4);
957 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("%sstring '%s' not found on '%s://%s:%d%s', "), msg
, output_string_search
, use_ssl
? "https" : "http", host_name
? host_name
: server_address
, server_port
, server_url
);
958 result
= STATE_CRITICAL
;
962 if (strlen (regexp
)) {
963 errcode
= regexec (&preg
, body_buf
.buf
, REGS
, pmatch
, 0);
964 if ((errcode
== 0 && invert_regex
== 0) || (errcode
== REG_NOMATCH
&& invert_regex
== 1)) {
965 /* OK - No-op to avoid changing the logic around it */
966 result
= max_state_alt(STATE_OK
, result
);
968 else if ((errcode
== REG_NOMATCH
&& invert_regex
== 0) || (errcode
== 0 && invert_regex
== 1)) {
969 if (invert_regex
== 0)
970 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("%spattern not found, "), msg
);
972 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("%spattern found, "), msg
);
973 result
= STATE_CRITICAL
;
976 regerror (errcode
, &preg
, errbuf
, MAX_INPUT_BUFFER
);
977 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("%sExecute Error: %s, "), msg
, errbuf
);
978 result
= STATE_UNKNOWN
;
982 /* make sure the page is of an appropriate size */
983 if ((max_page_len
> 0) && (page_len
> max_page_len
)) {
984 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("%spage size %d too large, "), msg
, page_len
);
985 result
= max_state_alt(STATE_WARNING
, result
);
986 } else if ((min_page_len
> 0) && (page_len
< min_page_len
)) {
987 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("%spage size %d too small, "), msg
, page_len
);
988 result
= max_state_alt(STATE_WARNING
, result
);
991 /* -w, -c: check warning and critical level */
992 result
= max_state_alt(get_status(total_time
, thlds
), result
);
994 /* Cut-off trailing characters */
995 if(msg
[strlen(msg
)-2] == ',')
996 msg
[strlen(msg
)-2] = '\0';
998 msg
[strlen(msg
)-3] = '\0';
1000 /* TODO: separate _() msg and status code: die (result, "HTTP %s: %s\n", state_text(result), msg); */
1001 die (result
, "HTTP %s: %s %d %s%s%s - %d bytes in %.3f second response time %s|%s\n%s%s",
1002 state_text(result
), string_statuscode (status_line
.http_major
, status_line
.http_minor
),
1003 status_line
.http_code
, status_line
.msg
,
1004 strlen(msg
) > 0 ? " - " : "",
1005 msg
, page_len
, total_time
,
1006 (display_html
? "</A>" : ""),
1008 (show_body
? body_buf
.buf
: ""),
1009 (show_body
? "\n" : "") );
1011 /* proper cleanup after die? */
1012 curlhelp_free_statusline(&status_line
);
1013 curl_easy_cleanup (curl
);
1014 curl_global_cleanup ();
1015 curlhelp_freewritebuffer (&body_buf
);
1016 curlhelp_freewritebuffer (&header_buf
);
1017 if (!strcmp (http_method
, "PUT")) {
1018 curlhelp_freereadbuffer (&put_buf
);
1025 uri_strcmp (const UriTextRangeA range
, const char* s
)
1027 if (!range
.first
) return -1;
1028 if (range
.afterLast
- range
.first
< strlen (s
)) return -1;
1029 return strncmp (s
, range
.first
, min( range
.afterLast
- range
.first
, strlen (s
)));
1033 uri_string (const UriTextRangeA range
, char* buf
, size_t buflen
)
1035 if (!range
.first
) return "(null)";
1036 strncpy (buf
, range
.first
, max (buflen
-1, range
.afterLast
- range
.first
));
1037 buf
[max (buflen
-1, range
.afterLast
- range
.first
)] = '\0';
1038 buf
[range
.afterLast
- range
.first
] = '\0';
1043 redir (curlhelp_write_curlbuf
* header_buf
)
1045 char *location
= NULL
;
1046 curlhelp_statusline status_line
;
1047 struct phr_header headers
[255];
1048 size_t nof_headers
= 255;
1050 char buf
[DEFAULT_BUFFER_SIZE
];
1051 char ipstr
[INET_ADDR_MAX_SIZE
];
1056 int res
= phr_parse_response (header_buf
->buf
, header_buf
->buflen
,
1057 &status_line
.http_minor
, &status_line
.http_code
, &status_line
.msg
, &msglen
,
1058 headers
, &nof_headers
, 0);
1060 location
= get_header_value (headers
, nof_headers
, "location");
1063 printf(_("* Seen redirect location %s\n"), location
);
1065 if (++redir_depth
> max_depth
)
1067 _("HTTP WARNING - maximum redirection depth %d exceeded - %s%s\n"),
1068 max_depth
, location
, (display_html
? "</A>" : ""));
1070 UriParserStateA state
;
1073 if (uriParseUriA (&state
, location
) != URI_SUCCESS
) {
1074 if (state
.errorCode
== URI_ERROR_SYNTAX
) {
1076 _("HTTP UNKNOWN - Could not parse redirect location '%s'%s\n"),
1077 location
, (display_html
? "</A>" : ""));
1078 } else if (state
.errorCode
== URI_ERROR_MALLOC
) {
1079 die (STATE_UNKNOWN
, _("HTTP UNKNOWN - Could not allocate URL\n"));
1084 printf (_("** scheme: %s\n"),
1085 uri_string (uri
.scheme
, buf
, DEFAULT_BUFFER_SIZE
));
1086 printf (_("** host: %s\n"),
1087 uri_string (uri
.hostText
, buf
, DEFAULT_BUFFER_SIZE
));
1088 printf (_("** port: %s\n"),
1089 uri_string (uri
.portText
, buf
, DEFAULT_BUFFER_SIZE
));
1090 if (uri
.hostData
.ip4
) {
1091 inet_ntop (AF_INET
, uri
.hostData
.ip4
->data
, ipstr
, sizeof (ipstr
));
1092 printf (_("** IPv4: %s\n"), ipstr
);
1094 if (uri
.hostData
.ip6
) {
1095 inet_ntop (AF_INET
, uri
.hostData
.ip6
->data
, ipstr
, sizeof (ipstr
));
1096 printf (_("** IPv6: %s\n"), ipstr
);
1099 printf (_("** path: "));
1100 const UriPathSegmentA
* p
= uri
.pathHead
;
1101 for (; p
; p
= p
->next
) {
1102 printf ("/%s", uri_string (p
->text
, buf
, DEFAULT_BUFFER_SIZE
));
1106 if (uri
.query
.first
) {
1107 printf (_("** query: %s\n"),
1108 uri_string (uri
.query
, buf
, DEFAULT_BUFFER_SIZE
));
1110 if (uri
.fragment
.first
) {
1111 printf (_("** fragment: %s\n"),
1112 uri_string (uri
.fragment
, buf
, DEFAULT_BUFFER_SIZE
));
1116 use_ssl
= !uri_strcmp (uri
.scheme
, "https");
1118 /* we do a sloppy test here only, because uriparser would have failed
1119 * above, if the port would be invalid, we just check for MAX_PORT
1121 if (uri
.portText
.first
) {
1122 new_port
= atoi (uri_string (uri
.portText
, buf
, DEFAULT_BUFFER_SIZE
));
1124 new_port
= HTTP_PORT
;
1126 new_port
= HTTPS_PORT
;
1128 if (new_port
> MAX_PORT
)
1130 _("HTTP UNKNOWN - Redirection to port above %d - %s%s\n"),
1131 MAX_PORT
, location
, display_html
? "</A>" : "");
1133 /* by RFC 7231 relative URLs in Location should be taken relative to
1134 * the original URL, so wy try to form a new absolute URL here
1136 if (!uri
.scheme
.first
&& !uri
.hostText
.first
) {
1137 new_host
= strdup (host_name
? host_name
: server_address
);
1139 new_host
= strdup (uri_string (uri
.hostText
, buf
, DEFAULT_BUFFER_SIZE
));
1142 /* compose new path */
1143 /* TODO: handle fragments and query part of URL */
1144 new_url
= (char *)calloc( 1, DEFAULT_BUFFER_SIZE
);
1146 const UriPathSegmentA
* p
= uri
.pathHead
;
1147 for (; p
; p
= p
->next
) {
1148 strncat (new_url
, "/", DEFAULT_BUFFER_SIZE
);
1149 strncat (new_url
, uri_string (p
->text
, buf
, DEFAULT_BUFFER_SIZE
), DEFAULT_BUFFER_SIZE
-1);
1153 if (server_port
==new_port
&&
1154 !strncmp(server_address
, new_host
, MAX_IPV4_HOSTLENGTH
) &&
1155 (host_name
&& !strncmp(host_name
, new_host
, MAX_IPV4_HOSTLENGTH
)) &&
1156 !strcmp(server_url
, new_url
))
1157 die (STATE_CRITICAL
,
1158 _("HTTP CRITICAL - redirection creates an infinite loop - %s://%s:%d%s%s\n"),
1159 use_ssl
? "https" : "http", new_host
, new_port
, new_url
, (display_html
? "</A>" : ""));
1161 /* set new values for redirected request */
1163 if (!(followsticky
& STICKY_HOST
)) {
1164 free (server_address
);
1165 server_address
= strndup (new_host
, MAX_IPV4_HOSTLENGTH
);
1167 if (!(followsticky
& STICKY_PORT
)) {
1168 server_port
= (unsigned short)new_port
;
1172 host_name
= strndup (new_host
, MAX_IPV4_HOSTLENGTH
);
1174 /* reset virtual port */
1175 virtual_port
= server_port
;
1179 server_url
= new_url
;
1181 uriFreeUriMembersA (&uri
);
1184 printf (_("Redirection to %s://%s:%d%s\n"), use_ssl
? "https" : "http",
1185 host_name
? host_name
: server_address
, server_port
, server_url
);
1187 /* TODO: the hash component MUST be taken from the original URL and
1188 * attached to the URL in Location
1194 /* check whether a file exists */
1196 test_file (char *path
)
1198 if (access(path
, R_OK
) == 0)
1200 usage2 (_("file does not exist or is not readable"), path
);
1204 process_arguments (int argc
, char **argv
)
1211 INVERT_REGEX
= CHAR_MAX
+ 1,
1214 HTTP_VERSION_OPTION
,
1215 AUTOMATIC_DECOMPRESSION
1220 static struct option longopts
[] = {
1222 {"link", no_argument
, 0, 'L'},
1223 {"nohtml", no_argument
, 0, 'n'},
1224 {"ssl", optional_argument
, 0, 'S'},
1225 {"sni", no_argument
, 0, SNI_OPTION
},
1226 {"post", required_argument
, 0, 'P'},
1227 {"method", required_argument
, 0, 'j'},
1228 {"IP-address", required_argument
, 0, 'I'},
1229 {"url", required_argument
, 0, 'u'},
1230 {"port", required_argument
, 0, 'p'},
1231 {"authorization", required_argument
, 0, 'a'},
1232 {"proxy-authorization", required_argument
, 0, 'b'},
1233 {"header-string", required_argument
, 0, 'd'},
1234 {"string", required_argument
, 0, 's'},
1235 {"expect", required_argument
, 0, 'e'},
1236 {"regex", required_argument
, 0, 'r'},
1237 {"ereg", required_argument
, 0, 'r'},
1238 {"eregi", required_argument
, 0, 'R'},
1239 {"linespan", no_argument
, 0, 'l'},
1240 {"onredirect", required_argument
, 0, 'f'},
1241 {"certificate", required_argument
, 0, 'C'},
1242 {"client-cert", required_argument
, 0, 'J'},
1243 {"private-key", required_argument
, 0, 'K'},
1244 {"ca-cert", required_argument
, 0, CA_CERT_OPTION
},
1245 {"verify-cert", no_argument
, 0, 'D'},
1246 {"useragent", required_argument
, 0, 'A'},
1247 {"header", required_argument
, 0, 'k'},
1248 {"no-body", no_argument
, 0, 'N'},
1249 {"max-age", required_argument
, 0, 'M'},
1250 {"content-type", required_argument
, 0, 'T'},
1251 {"pagesize", required_argument
, 0, 'm'},
1252 {"invert-regex", no_argument
, NULL
, INVERT_REGEX
},
1253 {"use-ipv4", no_argument
, 0, '4'},
1254 {"use-ipv6", no_argument
, 0, '6'},
1255 {"extended-perfdata", no_argument
, 0, 'E'},
1256 {"show-body", no_argument
, 0, 'B'},
1257 {"http-version", required_argument
, 0, HTTP_VERSION_OPTION
},
1258 {"enable-automatic-decompression", no_argument
, 0, AUTOMATIC_DECOMPRESSION
},
1265 /* support check_http compatible arguments */
1266 for (c
= 1; c
< argc
; c
++) {
1267 if (strcmp ("-to", argv
[c
]) == 0)
1268 strcpy (argv
[c
], "-t");
1269 if (strcmp ("-hn", argv
[c
]) == 0)
1270 strcpy (argv
[c
], "-H");
1271 if (strcmp ("-wt", argv
[c
]) == 0)
1272 strcpy (argv
[c
], "-w");
1273 if (strcmp ("-ct", argv
[c
]) == 0)
1274 strcpy (argv
[c
], "-c");
1275 if (strcmp ("-nohtml", argv
[c
]) == 0)
1276 strcpy (argv
[c
], "-n");
1279 server_url
= strdup(DEFAULT_SERVER_URL
);
1282 c
= getopt_long (argc
, argv
, "Vvh46t:c:w:A:k:H:P:j:T:I:a:b:d:e:p:s:R:r:u:f:C:J:K:DnlLS::m:M:NEB", longopts
, &option
);
1283 if (c
== -1 || c
== EOF
|| c
== 1)
1289 exit(STATE_UNKNOWN
);
1292 print_revision(progname
, NP_VERSION
);
1293 print_curl_version();
1294 exit(STATE_UNKNOWN
);
1299 case 't': /* timeout period */
1300 if (!is_intnonneg (optarg
))
1301 usage2 (_("Timeout interval must be a positive integer"), optarg
);
1303 socket_timeout
= (int)strtol (optarg
, NULL
, 10);
1305 case 'c': /* critical time threshold */
1306 critical_thresholds
= optarg
;
1308 case 'w': /* warning time threshold */
1309 warning_thresholds
= optarg
;
1311 case 'H': /* virtual host */
1312 host_name
= strdup (optarg
);
1313 if (host_name
[0] == '[') {
1314 if ((p
= strstr (host_name
, "]:")) != NULL
) { /* [IPv6]:port */
1315 virtual_port
= atoi (p
+ 2);
1316 /* cut off the port */
1317 host_name_length
= strlen (host_name
) - strlen (p
) - 1;
1319 host_name
= strndup (optarg
, host_name_length
);
1321 } else if ((p
= strchr (host_name
, ':')) != NULL
1322 && strchr (++p
, ':') == NULL
) { /* IPv4:port or host:port */
1323 virtual_port
= atoi (p
);
1324 /* cut off the port */
1325 host_name_length
= strlen (host_name
) - strlen (p
) - 1;
1327 host_name
= strndup (optarg
, host_name_length
);
1330 case 'I': /* internet address */
1331 server_address
= strdup (optarg
);
1333 case 'u': /* URL path */
1334 server_url
= strdup (optarg
);
1336 case 'p': /* Server port */
1337 if (!is_intnonneg (optarg
))
1338 usage2 (_("Invalid port number, expecting a non-negative number"), optarg
);
1340 if( strtol(optarg
, NULL
, 10) > MAX_PORT
)
1341 usage2 (_("Invalid port number, supplied port number is too big"), optarg
);
1342 server_port
= (unsigned short)strtol(optarg
, NULL
, 10);
1343 specify_port
= TRUE
;
1346 case 'a': /* authorization info */
1347 strncpy (user_auth
, optarg
, MAX_INPUT_BUFFER
- 1);
1348 user_auth
[MAX_INPUT_BUFFER
- 1] = 0;
1350 case 'b': /* proxy-authorization info */
1351 strncpy (proxy_auth
, optarg
, MAX_INPUT_BUFFER
- 1);
1352 proxy_auth
[MAX_INPUT_BUFFER
- 1] = 0;
1354 case 'P': /* HTTP POST data in URL encoded format; ignored if settings already */
1355 if (! http_post_data
)
1356 http_post_data
= strdup (optarg
);
1358 http_method
= strdup("POST");
1360 case 'j': /* Set HTTP method */
1363 http_method
= strdup (optarg
);
1365 case 'A': /* useragent */
1366 strncpy (user_agent
, optarg
, DEFAULT_BUFFER_SIZE
);
1367 user_agent
[DEFAULT_BUFFER_SIZE
-1] = '\0';
1369 case 'k': /* Additional headers */
1370 if (http_opt_headers_count
== 0)
1371 http_opt_headers
= malloc (sizeof (char *) * (++http_opt_headers_count
));
1373 http_opt_headers
= realloc (http_opt_headers
, sizeof (char *) * (++http_opt_headers_count
));
1374 http_opt_headers
[http_opt_headers_count
- 1] = optarg
;
1376 case 'L': /* show html link */
1377 display_html
= TRUE
;
1379 case 'n': /* do not show html link */
1380 display_html
= FALSE
;
1382 case 'C': /* Check SSL cert validity */
1383 #ifdef LIBCURL_FEATURE_SSL
1384 if ((temp
=strchr(optarg
,','))!=NULL
) {
1386 if (!is_intnonneg (optarg
))
1387 usage2 (_("Invalid certificate expiration period"), optarg
);
1388 days_till_exp_warn
= atoi(optarg
);
1391 if (!is_intnonneg (temp
))
1392 usage2 (_("Invalid certificate expiration period"), temp
);
1393 days_till_exp_crit
= atoi (temp
);
1396 days_till_exp_crit
=0;
1397 if (!is_intnonneg (optarg
))
1398 usage2 (_("Invalid certificate expiration period"), optarg
);
1399 days_till_exp_warn
= atoi (optarg
);
1404 case 'J': /* use client certificate */
1405 #ifdef LIBCURL_FEATURE_SSL
1407 client_cert
= optarg
;
1410 case 'K': /* use client private key */
1411 #ifdef LIBCURL_FEATURE_SSL
1413 client_privkey
= optarg
;
1416 #ifdef LIBCURL_FEATURE_SSL
1417 case CA_CERT_OPTION
: /* use CA chain file */
1422 #ifdef LIBCURL_FEATURE_SSL
1423 case 'D': /* verify peer certificate & host */
1424 verify_peer_and_host
= TRUE
;
1427 case 'S': /* use SSL */
1428 #ifdef LIBCURL_FEATURE_SSL
1431 /* ssl_version initialized to CURL_SSLVERSION_DEFAULT as a default.
1432 * Only set if it's non-zero. This helps when we include multiple
1433 * parameters, like -S and -C combinations */
1434 ssl_version
= CURL_SSLVERSION_DEFAULT
;
1435 if (c
=='S' && optarg
!= NULL
) {
1436 char *plus_ptr
= strchr(optarg
, '+');
1442 if (optarg
[0] == '2')
1443 ssl_version
= CURL_SSLVERSION_SSLv2
;
1444 else if (optarg
[0] == '3')
1445 ssl_version
= CURL_SSLVERSION_SSLv3
;
1446 else if (!strcmp (optarg
, "1") || !strcmp (optarg
, "1.0"))
1447 #if LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 34, 0)
1448 ssl_version
= CURL_SSLVERSION_TLSv1_0
;
1450 ssl_version
= CURL_SSLVERSION_DEFAULT
;
1451 #endif /* LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 34, 0) */
1452 else if (!strcmp (optarg
, "1.1"))
1453 #if LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 34, 0)
1454 ssl_version
= CURL_SSLVERSION_TLSv1_1
;
1456 ssl_version
= CURL_SSLVERSION_DEFAULT
;
1457 #endif /* LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 34, 0) */
1458 else if (!strcmp (optarg
, "1.2"))
1459 #if LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 34, 0)
1460 ssl_version
= CURL_SSLVERSION_TLSv1_2
;
1462 ssl_version
= CURL_SSLVERSION_DEFAULT
;
1463 #endif /* LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 34, 0) */
1464 else if (!strcmp (optarg
, "1.3"))
1465 #if LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 52, 0)
1466 ssl_version
= CURL_SSLVERSION_TLSv1_3
;
1468 ssl_version
= CURL_SSLVERSION_DEFAULT
;
1469 #endif /* LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 52, 0) */
1471 usage4 (_("Invalid option - Valid SSL/TLS versions: 2, 3, 1, 1.1, 1.2, 1.3 (with optional '+' suffix)"));
1473 #if LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 54, 0)
1475 switch (ssl_version
) {
1476 case CURL_SSLVERSION_TLSv1_3
:
1477 ssl_version
|= CURL_SSLVERSION_MAX_TLSv1_3
;
1479 case CURL_SSLVERSION_TLSv1_2
:
1480 case CURL_SSLVERSION_TLSv1_1
:
1481 case CURL_SSLVERSION_TLSv1_0
:
1482 ssl_version
|= CURL_SSLVERSION_MAX_DEFAULT
;
1486 switch (ssl_version
) {
1487 case CURL_SSLVERSION_TLSv1_3
:
1488 ssl_version
|= CURL_SSLVERSION_MAX_TLSv1_3
;
1490 case CURL_SSLVERSION_TLSv1_2
:
1491 ssl_version
|= CURL_SSLVERSION_MAX_TLSv1_2
;
1493 case CURL_SSLVERSION_TLSv1_1
:
1494 ssl_version
|= CURL_SSLVERSION_MAX_TLSv1_1
;
1496 case CURL_SSLVERSION_TLSv1_0
:
1497 ssl_version
|= CURL_SSLVERSION_MAX_TLSv1_0
;
1501 #endif /* LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 54, 0) */
1503 printf(_("* Set SSL/TLS version to %d\n"), ssl_version
);
1504 if (specify_port
== FALSE
)
1505 server_port
= HTTPS_PORT
;
1507 #else /* LIBCURL_FEATURE_SSL */
1508 /* -C -J and -K fall through to here without SSL */
1509 usage4 (_("Invalid option - SSL is not available"));
1511 case SNI_OPTION
: /* --sni is parsed, but ignored, the default is TRUE with libcurl */
1514 #endif /* LIBCURL_FEATURE_SSL */
1515 case 'f': /* onredirect */
1516 if (!strcmp (optarg
, "ok"))
1517 onredirect
= STATE_OK
;
1518 else if (!strcmp (optarg
, "warning"))
1519 onredirect
= STATE_WARNING
;
1520 else if (!strcmp (optarg
, "critical"))
1521 onredirect
= STATE_CRITICAL
;
1522 else if (!strcmp (optarg
, "unknown"))
1523 onredirect
= STATE_UNKNOWN
;
1524 else if (!strcmp (optarg
, "follow"))
1525 onredirect
= STATE_DEPENDENT
;
1526 else if (!strcmp (optarg
, "stickyport"))
1527 onredirect
= STATE_DEPENDENT
, followmethod
= FOLLOW_HTTP_CURL
, followsticky
= STICKY_HOST
|STICKY_PORT
;
1528 else if (!strcmp (optarg
, "sticky"))
1529 onredirect
= STATE_DEPENDENT
, followmethod
= FOLLOW_HTTP_CURL
, followsticky
= STICKY_HOST
;
1530 else if (!strcmp (optarg
, "follow"))
1531 onredirect
= STATE_DEPENDENT
, followmethod
= FOLLOW_HTTP_CURL
, followsticky
= STICKY_NONE
;
1532 else if (!strcmp (optarg
, "curl"))
1533 onredirect
= STATE_DEPENDENT
, followmethod
= FOLLOW_LIBCURL
;
1534 else usage2 (_("Invalid onredirect option"), optarg
);
1536 printf(_("* Following redirects set to %s\n"), state_text(onredirect
));
1538 case 'd': /* string or substring */
1539 strncpy (header_expect
, optarg
, MAX_INPUT_BUFFER
- 1);
1540 header_expect
[MAX_INPUT_BUFFER
- 1] = 0;
1542 case 's': /* string or substring */
1543 strncpy (string_expect
, optarg
, MAX_INPUT_BUFFER
- 1);
1544 string_expect
[MAX_INPUT_BUFFER
- 1] = 0;
1546 case 'e': /* string or substring */
1547 strncpy (server_expect
, optarg
, MAX_INPUT_BUFFER
- 1);
1548 server_expect
[MAX_INPUT_BUFFER
- 1] = 0;
1549 server_expect_yn
= 1;
1551 case 'T': /* Content-type */
1552 http_content_type
= strdup (optarg
);
1554 case 'l': /* linespan */
1555 cflags
&= ~REG_NEWLINE
;
1557 case 'R': /* regex */
1558 cflags
|= REG_ICASE
;
1559 case 'r': /* regex */
1560 strncpy (regexp
, optarg
, MAX_RE_SIZE
- 1);
1561 regexp
[MAX_RE_SIZE
- 1] = 0;
1562 errcode
= regcomp (&preg
, regexp
, cflags
);
1564 (void) regerror (errcode
, &preg
, errbuf
, MAX_INPUT_BUFFER
);
1565 printf (_("Could Not Compile Regular Expression: %s"), errbuf
);
1573 address_family
= AF_INET
;
1576 #if defined (USE_IPV6) && defined (LIBCURL_FEATURE_IPV6)
1577 address_family
= AF_INET6
;
1579 usage4 (_("IPv6 support not available"));
1582 case 'm': /* min_page_length */
1585 if (strchr(optarg
, ':') != (char *)NULL
) {
1586 /* range, so get two values, min:max */
1587 tmp
= strtok(optarg
, ":");
1589 printf("Bad format: try \"-m min:max\"\n");
1590 exit (STATE_WARNING
);
1592 min_page_len
= atoi(tmp
);
1594 tmp
= strtok(NULL
, ":");
1596 printf("Bad format: try \"-m min:max\"\n");
1597 exit (STATE_WARNING
);
1599 max_page_len
= atoi(tmp
);
1601 min_page_len
= atoi (optarg
);
1604 case 'N': /* no-body */
1607 case 'M': /* max-age */
1609 int L
= strlen(optarg
);
1610 if (L
&& optarg
[L
-1] == 'm')
1611 maximum_age
= atoi (optarg
) * 60;
1612 else if (L
&& optarg
[L
-1] == 'h')
1613 maximum_age
= atoi (optarg
) * 60 * 60;
1614 else if (L
&& optarg
[L
-1] == 'd')
1615 maximum_age
= atoi (optarg
) * 60 * 60 * 24;
1616 else if (L
&& (optarg
[L
-1] == 's' ||
1617 isdigit (optarg
[L
-1])))
1618 maximum_age
= atoi (optarg
);
1620 fprintf (stderr
, "unparsable max-age: %s\n", optarg
);
1621 exit (STATE_WARNING
);
1624 printf ("* Maximal age of document set to %d seconds\n", maximum_age
);
1627 case 'E': /* show extended perfdata */
1628 show_extended_perfdata
= TRUE
;
1630 case 'B': /* print body content after status line */
1633 case HTTP_VERSION_OPTION
:
1634 curl_http_version
= CURL_HTTP_VERSION_NONE
;
1635 if (strcmp (optarg
, "1.0") == 0) {
1636 curl_http_version
= CURL_HTTP_VERSION_1_0
;
1637 } else if (strcmp (optarg
, "1.1") == 0) {
1638 curl_http_version
= CURL_HTTP_VERSION_1_1
;
1639 } else if ((strcmp (optarg
, "2.0") == 0) || (strcmp (optarg
, "2") == 0)) {
1640 #if LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 33, 0)
1641 curl_http_version
= CURL_HTTP_VERSION_2_0
;
1643 curl_http_version
= CURL_HTTP_VERSION_NONE
;
1644 #endif /* LIBCURL_VERSION_NUM >= MAKE_LIBCURL_VERSION(7, 33, 0) */
1646 fprintf (stderr
, "unkown http-version parameter: %s\n", optarg
);
1647 exit (STATE_WARNING
);
1650 case AUTOMATIC_DECOMPRESSION
:
1651 automatic_decompression
= TRUE
;
1654 /* print short usage statement if args not parsable */
1662 if (server_address
== NULL
&& c
< argc
)
1663 server_address
= strdup (argv
[c
++]);
1665 if (host_name
== NULL
&& c
< argc
)
1666 host_name
= strdup (argv
[c
++]);
1668 if (server_address
== NULL
) {
1669 if (host_name
== NULL
)
1670 usage4 (_("You must specify a server address or host name"));
1672 server_address
= strdup (host_name
);
1675 set_thresholds(&thlds
, warning_thresholds
, critical_thresholds
);
1677 if (critical_thresholds
&& thlds
->critical
->end
>(double)socket_timeout
)
1678 socket_timeout
= (int)thlds
->critical
->end
+ 1;
1680 printf ("* Socket timeout set to %ld seconds\n", socket_timeout
);
1682 if (http_method
== NULL
)
1683 http_method
= strdup ("GET");
1685 if (client_cert
&& !client_privkey
)
1686 usage4 (_("If you use a client certificate you must also specify a private key file"));
1688 if (virtual_port
== 0)
1689 virtual_port
= server_port
;
1691 if ((use_ssl
&& server_port
== HTTPS_PORT
) || (!use_ssl
&& server_port
== HTTP_PORT
))
1692 if(specify_port
== FALSE
)
1693 server_port
= virtual_port
;
1699 char *perfd_time (double elapsed_time
)
1701 return fperfdata ("time", elapsed_time
, "s",
1702 thlds
->warning
?TRUE
:FALSE
, thlds
->warning
?thlds
->warning
->end
:0,
1703 thlds
->critical
?TRUE
:FALSE
, thlds
->critical
?thlds
->critical
->end
:0,
1704 TRUE
, 0, TRUE
, socket_timeout
);
1707 char *perfd_time_connect (double elapsed_time_connect
)
1709 return fperfdata ("time_connect", elapsed_time_connect
, "s", FALSE
, 0, FALSE
, 0, FALSE
, 0, TRUE
, socket_timeout
);
1712 char *perfd_time_ssl (double elapsed_time_ssl
)
1714 return fperfdata ("time_ssl", elapsed_time_ssl
, "s", FALSE
, 0, FALSE
, 0, FALSE
, 0, TRUE
, socket_timeout
);
1717 char *perfd_time_headers (double elapsed_time_headers
)
1719 return fperfdata ("time_headers", elapsed_time_headers
, "s", FALSE
, 0, FALSE
, 0, FALSE
, 0, TRUE
, socket_timeout
);
1722 char *perfd_time_firstbyte (double elapsed_time_firstbyte
)
1724 return fperfdata ("time_firstbyte", elapsed_time_firstbyte
, "s", FALSE
, 0, FALSE
, 0, FALSE
, 0, TRUE
, socket_timeout
);
1727 char *perfd_time_transfer (double elapsed_time_transfer
)
1729 return fperfdata ("time_transfer", elapsed_time_transfer
, "s", FALSE
, 0, FALSE
, 0, FALSE
, 0, TRUE
, socket_timeout
);
1732 char *perfd_size (int page_len
)
1734 return perfdata ("size", page_len
, "B",
1735 (min_page_len
>0?TRUE
:FALSE
), min_page_len
,
1736 (min_page_len
>0?TRUE
:FALSE
), 0,
1743 print_revision (progname
, NP_VERSION
);
1745 printf ("Copyright (c) 1999 Ethan Galstad <nagios@nagios.org>\n");
1746 printf (COPYRIGHT
, copyright
, email
);
1748 printf ("%s\n", _("This plugin tests the HTTP service on the specified host. It can test"));
1749 printf ("%s\n", _("normal (http) and secure (https) servers, follow redirects, search for"));
1750 printf ("%s\n", _("strings and regular expressions, check connection times, and report on"));
1751 printf ("%s\n", _("certificate expiration times."));
1753 printf ("%s\n", _("It makes use of libcurl to do so. It tries to be as compatible to check_http"));
1754 printf ("%s\n", _("as possible."));
1760 printf (_("NOTE: One or both of -H and -I must be specified"));
1764 printf (UT_HELP_VRSN
);
1765 printf (UT_EXTRA_OPTS
);
1767 printf (" %s\n", "-H, --hostname=ADDRESS");
1768 printf (" %s\n", _("Host name argument for servers using host headers (virtual host)"));
1769 printf (" %s\n", _("Append a port to include it in the header (eg: example.com:5000)"));
1770 printf (" %s\n", "-I, --IP-address=ADDRESS");
1771 printf (" %s\n", _("IP address or name (use numeric address if possible to bypass DNS lookup)."));
1772 printf (" %s\n", "-p, --port=INTEGER");
1773 printf (" %s", _("Port number (default: "));
1774 printf ("%d)\n", HTTP_PORT
);
1778 #ifdef LIBCURL_FEATURE_SSL
1779 printf (" %s\n", "-S, --ssl=VERSION[+]");
1780 printf (" %s\n", _("Connect via SSL. Port defaults to 443. VERSION is optional, and prevents"));
1781 printf (" %s\n", _("auto-negotiation (2 = SSLv2, 3 = SSLv3, 1 = TLSv1, 1.1 = TLSv1.1,"));
1782 printf (" %s\n", _("1.2 = TLSv1.2, 1.3 = TLSv1.3). With a '+' suffix, newer versions are also accepted."));
1783 printf (" %s\n", _("Note: SSLv2 and SSLv3 are deprecated and are usually disabled in libcurl"));
1784 printf (" %s\n", "--sni");
1785 printf (" %s\n", _("Enable SSL/TLS hostname extension support (SNI)"));
1786 #if LIBCURL_VERSION_NUM >= 0x071801
1787 printf (" %s\n", _("Note: --sni is the default in libcurl as SSLv2 and SSLV3 are deprecated and"));
1788 printf (" %s\n", _(" SNI only really works since TLSv1.0"));
1790 printf (" %s\n", _("Note: SNI is not supported in libcurl before 7.18.1"));
1792 printf (" %s\n", "-C, --certificate=INTEGER[,INTEGER]");
1793 printf (" %s\n", _("Minimum number of days a certificate has to be valid. Port defaults to 443"));
1794 printf (" %s\n", _("(when this option is used the URL is not checked.)"));
1795 printf (" %s\n", "-J, --client-cert=FILE");
1796 printf (" %s\n", _("Name of file that contains the client certificate (PEM format)"));
1797 printf (" %s\n", _("to be used in establishing the SSL session"));
1798 printf (" %s\n", "-K, --private-key=FILE");
1799 printf (" %s\n", _("Name of file containing the private key (PEM format)"));
1800 printf (" %s\n", _("matching the client certificate"));
1801 printf (" %s\n", "--ca-cert=FILE");
1802 printf (" %s\n", _("CA certificate file to verify peer against"));
1803 printf (" %s\n", "-D, --verify-cert");
1804 printf (" %s\n", _("Verify the peer's SSL certificate and hostname"));
1807 printf (" %s\n", "-e, --expect=STRING");
1808 printf (" %s\n", _("Comma-delimited list of strings, at least one of them is expected in"));
1809 printf (" %s", _("the first (status) line of the server response (default: "));
1810 printf ("%s)\n", HTTP_EXPECT
);
1811 printf (" %s\n", _("If specified skips all other status line logic (ex: 3xx, 4xx, 5xx processing)"));
1812 printf (" %s\n", "-d, --header-string=STRING");
1813 printf (" %s\n", _("String to expect in the response headers"));
1814 printf (" %s\n", "-s, --string=STRING");
1815 printf (" %s\n", _("String to expect in the content"));
1816 printf (" %s\n", "-u, --url=PATH");
1817 printf (" %s\n", _("URL to GET or POST (default: /)"));
1818 printf (" %s\n", "-P, --post=STRING");
1819 printf (" %s\n", _("URL encoded http POST data"));
1820 printf (" %s\n", "-j, --method=STRING (for example: HEAD, OPTIONS, TRACE, PUT, DELETE, CONNECT)");
1821 printf (" %s\n", _("Set HTTP method."));
1822 printf (" %s\n", "-N, --no-body");
1823 printf (" %s\n", _("Don't wait for document body: stop reading after headers."));
1824 printf (" %s\n", _("(Note that this still does an HTTP GET or POST, not a HEAD.)"));
1825 printf (" %s\n", "-M, --max-age=SECONDS");
1826 printf (" %s\n", _("Warn if document is more than SECONDS old. the number can also be of"));
1827 printf (" %s\n", _("the form \"10m\" for minutes, \"10h\" for hours, or \"10d\" for days."));
1828 printf (" %s\n", "-T, --content-type=STRING");
1829 printf (" %s\n", _("specify Content-Type header media type when POSTing\n"));
1830 printf (" %s\n", "-l, --linespan");
1831 printf (" %s\n", _("Allow regex to span newlines (must precede -r or -R)"));
1832 printf (" %s\n", "-r, --regex, --ereg=STRING");
1833 printf (" %s\n", _("Search page for regex STRING"));
1834 printf (" %s\n", "-R, --eregi=STRING");
1835 printf (" %s\n", _("Search page for case-insensitive regex STRING"));
1836 printf (" %s\n", "--invert-regex");
1837 printf (" %s\n", _("Return CRITICAL if found, OK if not\n"));
1838 printf (" %s\n", "-a, --authorization=AUTH_PAIR");
1839 printf (" %s\n", _("Username:password on sites with basic authentication"));
1840 printf (" %s\n", "-b, --proxy-authorization=AUTH_PAIR");
1841 printf (" %s\n", _("Username:password on proxy-servers with basic authentication"));
1842 printf (" %s\n", "-A, --useragent=STRING");
1843 printf (" %s\n", _("String to be sent in http header as \"User Agent\""));
1844 printf (" %s\n", "-k, --header=STRING");
1845 printf (" %s\n", _("Any other tags to be sent in http header. Use multiple times for additional headers"));
1846 printf (" %s\n", "-E, --extended-perfdata");
1847 printf (" %s\n", _("Print additional performance data"));
1848 printf (" %s\n", "-B, --show-body");
1849 printf (" %s\n", _("Print body content below status line"));
1850 printf (" %s\n", "-L, --link");
1851 printf (" %s\n", _("Wrap output in HTML link (obsoleted by urlize)"));
1852 printf (" %s\n", "-f, --onredirect=<ok|warning|critical|follow|sticky|stickyport|curl>");
1853 printf (" %s\n", _("How to handle redirected pages. sticky is like follow but stick to the"));
1854 printf (" %s\n", _("specified IP address. stickyport also ensures port stays the same."));
1855 printf (" %s\n", _("follow uses the old redirection algorithm of check_http."));
1856 printf (" %s\n", _("curl uses CURL_FOLLOWLOCATION built into libcurl."));
1857 printf (" %s\n", "-m, --pagesize=INTEGER<:INTEGER>");
1858 printf (" %s\n", _("Minimum page size required (bytes) : Maximum page size required (bytes)"));
1860 printf (" %s\n", "--http-version=VERSION");
1861 printf (" %s\n", _("Connect via specific HTTP protocol."));
1862 printf (" %s\n", _("1.0 = HTTP/1.0, 1.1 = HTTP/1.1, 2.0 = HTTP/2 (HTTP/2 will fail without -S)"));
1863 printf (" %s\n", "--enable-automatic-decompression");
1864 printf (" %s\n", _("Enable automatic decompression of body (CURLOPT_ACCEPT_ENCODING)."));
1867 printf (UT_WARN_CRIT
);
1869 printf (UT_CONN_TIMEOUT
, DEFAULT_SOCKET_TIMEOUT
);
1871 printf (UT_VERBOSE
);
1874 printf ("%s\n", _("Notes:"));
1875 printf (" %s\n", _("This plugin will attempt to open an HTTP connection with the host."));
1876 printf (" %s\n", _("Successful connects return STATE_OK, refusals and timeouts return STATE_CRITICAL"));
1877 printf (" %s\n", _("other errors return STATE_UNKNOWN. Successful connects, but incorrect response"));
1878 printf (" %s\n", _("messages from the host result in STATE_WARNING return values. If you are"));
1879 printf (" %s\n", _("checking a virtual server that uses 'host headers' you must supply the FQDN"));
1880 printf (" %s\n", _("(fully qualified domain name) as the [host_name] argument."));
1882 #ifdef LIBCURL_FEATURE_SSL
1884 printf (" %s\n", _("This plugin can also check whether an SSL enabled web server is able to"));
1885 printf (" %s\n", _("serve content (optionally within a specified time) or whether the X509 "));
1886 printf (" %s\n", _("certificate is still valid for the specified number of days."));
1888 printf (" %s\n", _("Please note that this plugin does not check if the presented server"));
1889 printf (" %s\n", _("certificate matches the hostname of the server, or if the certificate"));
1890 printf (" %s\n", _("has a valid chain of trust to one of the locally installed CAs."));
1892 printf ("%s\n", _("Examples:"));
1893 printf (" %s\n\n", "CHECK CONTENT: check_curl -w 5 -c 10 --ssl -H www.verisign.com");
1894 printf (" %s\n", _("When the 'www.verisign.com' server returns its content within 5 seconds,"));
1895 printf (" %s\n", _("a STATE_OK will be returned. When the server returns its content but exceeds"));
1896 printf (" %s\n", _("the 5-second threshold, a STATE_WARNING will be returned. When an error occurs,"));
1897 printf (" %s\n", _("a STATE_CRITICAL will be returned."));
1899 printf (" %s\n\n", "CHECK CERTIFICATE: check_curl -H www.verisign.com -C 14");
1900 printf (" %s\n", _("When the certificate of 'www.verisign.com' is valid for more than 14 days,"));
1901 printf (" %s\n", _("a STATE_OK is returned. When the certificate is still valid, but for less than"));
1902 printf (" %s\n", _("14 days, a STATE_WARNING is returned. A STATE_CRITICAL will be returned when"));
1903 printf (" %s\n\n", _("the certificate is expired."));
1905 printf (" %s\n\n", "CHECK CERTIFICATE: check_curl -H www.verisign.com -C 30,14");
1906 printf (" %s\n", _("When the certificate of 'www.verisign.com' is valid for more than 30 days,"));
1907 printf (" %s\n", _("a STATE_OK is returned. When the certificate is still valid, but for less than"));
1908 printf (" %s\n", _("30 days, but more than 14 days, a STATE_WARNING is returned."));
1909 printf (" %s\n", _("A STATE_CRITICAL will be returned when certificate expires in less than 14 days"));
1912 printf ("\n %s\n", "CHECK WEBSERVER CONTENT VIA PROXY:");
1913 printf (" %s\n", _("It is recommended to use an environment proxy like:"));
1914 printf (" %s\n", _("http_proxy=http://192.168.100.35:3128 ./check_curl -H www.monitoring-plugins.org"));
1915 printf (" %s\n", _("legacy proxy requests in check_http style still work:"));
1916 printf (" %s\n", _("check_curl -I 192.168.100.35 -p 3128 -u http://www.monitoring-plugins.org/ -H www.monitoring-plugins.org"));
1918 #ifdef LIBCURL_FEATURE_SSL
1919 printf ("\n %s\n", "CHECK SSL WEBSERVER CONTENT VIA PROXY USING HTTP 1.1 CONNECT: ");
1920 printf (" %s\n", _("It is recommended to use an environment proxy like:"));
1921 printf (" %s\n", _("https_proxy=http://192.168.100.35:3128 ./check_curl -H www.verisign.com -S"));
1922 printf (" %s\n", _("legacy proxy requests in check_http style still work:"));
1923 printf (" %s\n", _("check_curl -I 192.168.100.35 -p 3128 -u https://www.verisign.com/ -S -j CONNECT -H www.verisign.com "));
1924 printf (" %s\n", _("all these options are needed: -I <proxy> -p <proxy-port> -u <check-url> -S(sl) -j CONNECT -H <webserver>"));
1925 printf (" %s\n", _("a STATE_OK will be returned. When the server returns its content but exceeds"));
1926 printf (" %s\n", _("the 5-second threshold, a STATE_WARNING will be returned. When an error occurs,"));
1927 printf (" %s\n", _("a STATE_CRITICAL will be returned."));
1931 printf (UT_SUPPORT
);
1940 printf ("%s\n", _("Usage:"));
1941 printf (" %s -H <vhost> | -I <IP-address> [-u <uri>] [-p <port>]\n",progname
);
1942 printf (" [-J <client certificate file>] [-K <private key>] [--ca-cert <CA certificate file>] [-D]\n");
1943 printf (" [-w <warn time>] [-c <critical time>] [-t <timeout>] [-L] [-E] [-a auth]\n");
1944 printf (" [-b proxy_auth] [-f <ok|warning|critcal|follow|sticky|stickyport|curl>]\n");
1945 printf (" [-e <expect>] [-d string] [-s string] [-l] [-r <regex> | -R <case-insensitive regex>]\n");
1946 printf (" [-P string] [-m <min_pg_size>:<max_pg_size>] [-4|-6] [-N] [-M <age>]\n");
1947 printf (" [-A string] [-k string] [-S <version>] [--sni]\n");
1948 printf (" [-T <content-type>] [-j method]\n");
1949 printf (" [--http-version=<version>]\n");
1950 printf (" %s -H <vhost> | -I <IP-address> -C <warn_age>[,<crit_age>]\n",progname
);
1951 printf (" [-p <port>] [-t <timeout>] [-4|-6] [--sni]\n");
1953 #ifdef LIBCURL_FEATURE_SSL
1954 printf ("%s\n", _("In the first form, make an HTTP request."));
1955 printf ("%s\n\n", _("In the second form, connect to the server and check the TLS certificate."));
1957 printf ("%s\n", _("WARNING: check_curl is experimental. Please use"));
1958 printf ("%s\n\n", _("check_http if you need a stable version."));
1962 print_curl_version (void)
1964 printf( "%s\n", curl_version());
1968 curlhelp_initwritebuffer (curlhelp_write_curlbuf
*buf
)
1970 buf
->bufsize
= DEFAULT_BUFFER_SIZE
;
1972 buf
->buf
= (char *)malloc ((size_t)buf
->bufsize
);
1973 if (buf
->buf
== NULL
) return -1;
1978 curlhelp_buffer_write_callback (void *buffer
, size_t size
, size_t nmemb
, void *stream
)
1980 curlhelp_write_curlbuf
*buf
= (curlhelp_write_curlbuf
*)stream
;
1982 while (buf
->bufsize
< buf
->buflen
+ size
* nmemb
+ 1) {
1983 buf
->bufsize
*= buf
->bufsize
* 2;
1984 buf
->buf
= (char *)realloc (buf
->buf
, buf
->bufsize
);
1985 if (buf
->buf
== NULL
) return -1;
1988 memcpy (buf
->buf
+ buf
->buflen
, buffer
, size
* nmemb
);
1989 buf
->buflen
+= size
* nmemb
;
1990 buf
->buf
[buf
->buflen
] = '\0';
1992 return (int)(size
* nmemb
);
1996 curlhelp_buffer_read_callback (void *buffer
, size_t size
, size_t nmemb
, void *stream
)
1998 curlhelp_read_curlbuf
*buf
= (curlhelp_read_curlbuf
*)stream
;
2000 size_t n
= min (nmemb
* size
, buf
->buflen
- buf
->pos
);
2002 memcpy (buffer
, buf
->buf
+ buf
->pos
, n
);
2009 curlhelp_freewritebuffer (curlhelp_write_curlbuf
*buf
)
2016 curlhelp_initreadbuffer (curlhelp_read_curlbuf
*buf
, const char *data
, size_t datalen
)
2018 buf
->buflen
= datalen
;
2019 buf
->buf
= (char *)malloc ((size_t)buf
->buflen
);
2020 if (buf
->buf
== NULL
) return -1;
2021 memcpy (buf
->buf
, data
, datalen
);
2027 curlhelp_freereadbuffer (curlhelp_read_curlbuf
*buf
)
2033 /* TODO: where to put this, it's actually part of sstrings2 (logically)?
2036 strrstr2(const char *haystack
, const char *needle
)
2040 const char *prev_pos
;
2043 if (haystack
== NULL
|| needle
== NULL
)
2046 if (haystack
[0] == '\0' || needle
[0] == '\0')
2052 len
= strlen (needle
);
2054 pos
= strstr (pos
, needle
);
2064 if (*pos
== '\0') return prev_pos
;
2069 curlhelp_parse_statusline (const char *buf
, curlhelp_statusline
*status_line
)
2071 char *first_line_end
;
2073 size_t first_line_len
;
2076 char *first_line_buf
;
2078 /* find last start of a new header */
2079 start
= strrstr2 (buf
, "\r\nHTTP/");
2080 if (start
!= NULL
) {
2085 first_line_end
= strstr(buf
, "\r\n");
2086 if (first_line_end
== NULL
) return -1;
2088 first_line_len
= (size_t)(first_line_end
- buf
);
2089 status_line
->first_line
= (char *)malloc (first_line_len
+ 1);
2090 if (status_line
->first_line
== NULL
) return -1;
2091 memcpy (status_line
->first_line
, buf
, first_line_len
);
2092 status_line
->first_line
[first_line_len
] = '\0';
2093 first_line_buf
= strdup( status_line
->first_line
);
2095 /* protocol and version: "HTTP/x.x" SP or "HTTP/2" SP */
2097 p
= strtok(first_line_buf
, "/");
2098 if( p
== NULL
) { free( first_line_buf
); return -1; }
2099 if( strcmp( p
, "HTTP" ) != 0 ) { free( first_line_buf
); return -1; }
2101 p
= strtok( NULL
, " " );
2102 if( p
== NULL
) { free( first_line_buf
); return -1; }
2103 if( strchr( p
, '.' ) != NULL
) {
2107 ppp
= strtok( p
, "." );
2108 status_line
->http_major
= (int)strtol( p
, &pp
, 10 );
2109 if( *pp
!= '\0' ) { free( first_line_buf
); return -1; }
2110 ppp
= strtok( NULL
, " " );
2111 status_line
->http_minor
= (int)strtol( p
, &pp
, 10 );
2112 if( *pp
!= '\0' ) { free( first_line_buf
); return -1; }
2113 p
+= 4; /* 1.x SP */
2116 status_line
->http_major
= (int)strtol( p
, &pp
, 10 );
2117 status_line
->http_minor
= 0;
2121 /* status code: "404" or "404.1", then SP */
2123 p
= strtok( p
, " " );
2124 if( p
== NULL
) { free( first_line_buf
); return -1; }
2125 if( strchr( p
, '.' ) != NULL
) {
2127 ppp
= strtok( p
, "." );
2128 status_line
->http_code
= (int)strtol( ppp
, &pp
, 10 );
2129 if( *pp
!= '\0' ) { free( first_line_buf
); return -1; }
2130 ppp
= strtok( NULL
, "" );
2131 status_line
->http_subcode
= (int)strtol( ppp
, &pp
, 10 );
2132 if( *pp
!= '\0' ) { free( first_line_buf
); return -1; }
2133 p
+= 6; /* 400.1 SP */
2135 status_line
->http_code
= (int)strtol( p
, &pp
, 10 );
2136 status_line
->http_subcode
= -1;
2137 if( *pp
!= '\0' ) { free( first_line_buf
); return -1; }
2138 p
+= 4; /* 400 SP */
2141 /* Human readable message: "Not Found" CRLF */
2143 p
= strtok( p
, "" );
2144 if( p
== NULL
) { status_line
->msg
= ""; return 0; }
2145 status_line
->msg
= status_line
->first_line
+ ( p
- first_line_buf
);
2146 free( first_line_buf
);
2152 curlhelp_free_statusline (curlhelp_statusline
*status_line
)
2154 free (status_line
->first_line
);
2158 remove_newlines (char *s
)
2162 for (p
= s
; *p
!= '\0'; p
++)
2163 if (*p
== '\r' || *p
== '\n')
2168 get_header_value (const struct phr_header
* headers
, const size_t nof_headers
, const char* header
)
2171 for( i
= 0; i
< nof_headers
; i
++ ) {
2172 if(headers
[i
].name
!= NULL
&& strncasecmp( header
, headers
[i
].name
, max( headers
[i
].name_len
, 4 ) ) == 0 ) {
2173 return strndup( headers
[i
].value
, headers
[i
].value_len
);
2180 check_document_dates (const curlhelp_write_curlbuf
*header_buf
, char (*msg
)[DEFAULT_BUFFER_SIZE
])
2182 char *server_date
= NULL
;
2183 char *document_date
= NULL
;
2184 int date_result
= STATE_OK
;
2185 curlhelp_statusline status_line
;
2186 struct phr_header headers
[255];
2187 size_t nof_headers
= 255;
2190 int res
= phr_parse_response (header_buf
->buf
, header_buf
->buflen
,
2191 &status_line
.http_minor
, &status_line
.http_code
, &status_line
.msg
, &msglen
,
2192 headers
, &nof_headers
, 0);
2194 server_date
= get_header_value (headers
, nof_headers
, "date");
2195 document_date
= get_header_value (headers
, nof_headers
, "last-modified");
2197 if (!server_date
|| !*server_date
) {
2198 snprintf (*msg
, DEFAULT_BUFFER_SIZE
, _("%sServer date unknown, "), *msg
);
2199 date_result
= max_state_alt(STATE_UNKNOWN
, date_result
);
2200 } else if (!document_date
|| !*document_date
) {
2201 snprintf (*msg
, DEFAULT_BUFFER_SIZE
, _("%sDocument modification date unknown, "), *msg
);
2202 date_result
= max_state_alt(STATE_CRITICAL
, date_result
);
2204 time_t srv_data
= curl_getdate (server_date
, NULL
);
2205 time_t doc_data
= curl_getdate (document_date
, NULL
);
2207 printf ("* server date: '%s' (%d), doc_date: '%s' (%d)\n", server_date
, (int)srv_data
, document_date
, (int)doc_data
);
2208 if (srv_data
<= 0) {
2209 snprintf (*msg
, DEFAULT_BUFFER_SIZE
, _("%sServer date \"%100s\" unparsable, "), *msg
, server_date
);
2210 date_result
= max_state_alt(STATE_CRITICAL
, date_result
);
2211 } else if (doc_data
<= 0) {
2212 snprintf (*msg
, DEFAULT_BUFFER_SIZE
, _("%sDocument date \"%100s\" unparsable, "), *msg
, document_date
);
2213 date_result
= max_state_alt(STATE_CRITICAL
, date_result
);
2214 } else if (doc_data
> srv_data
+ 30) {
2215 snprintf (*msg
, DEFAULT_BUFFER_SIZE
, _("%sDocument is %d seconds in the future, "), *msg
, (int)doc_data
- (int)srv_data
);
2216 date_result
= max_state_alt(STATE_CRITICAL
, date_result
);
2217 } else if (doc_data
< srv_data
- maximum_age
) {
2218 int n
= (srv_data
- doc_data
);
2219 if (n
> (60 * 60 * 24 * 2)) {
2220 snprintf (*msg
, DEFAULT_BUFFER_SIZE
, _("%sLast modified %.1f days ago, "), *msg
, ((float) n
) / (60 * 60 * 24));
2221 date_result
= max_state_alt(STATE_CRITICAL
, date_result
);
2223 snprintf (*msg
, DEFAULT_BUFFER_SIZE
, _("%sLast modified %d:%02d:%02d ago, "), *msg
, n
/ (60 * 60), (n
/ 60) % 60, n
% 60);
2224 date_result
= max_state_alt(STATE_CRITICAL
, date_result
);
2229 if (server_date
) free (server_date
);
2230 if (document_date
) free (document_date
);
2237 get_content_length (const curlhelp_write_curlbuf
* header_buf
, const curlhelp_write_curlbuf
* body_buf
)
2240 int content_length
= 0;
2242 struct phr_header headers
[255];
2243 size_t nof_headers
= 255;
2245 char *content_length_s
= NULL
;
2246 curlhelp_statusline status_line
;
2248 int res
= phr_parse_response (header_buf
->buf
, header_buf
->buflen
,
2249 &status_line
.http_minor
, &status_line
.http_code
, &status_line
.msg
, &msglen
,
2250 headers
, &nof_headers
, 0);
2252 content_length_s
= get_header_value (headers
, nof_headers
, "content-length");
2253 if (!content_length_s
) {
2254 return header_buf
->buflen
+ body_buf
->buflen
;
2256 content_length_s
+= strspn (content_length_s
, " \t");
2257 content_length
= atoi (content_length_s
);
2258 if (content_length
!= body_buf
->buflen
) {
2259 /* TODO: should we warn if the actual and the reported body length don't match? */
2262 if (content_length_s
) free (content_length_s
);
2264 return header_buf
->buflen
+ body_buf
->buflen
;
2267 /* TODO: is there a better way in libcurl to check for the SSL library? */
2268 curlhelp_ssl_library
2269 curlhelp_get_ssl_library (CURL
* curl
)
2271 curl_version_info_data
* version_data
;
2274 curlhelp_ssl_library ssl_library
= CURLHELP_SSL_LIBRARY_UNKNOWN
;
2276 version_data
= curl_version_info (CURLVERSION_NOW
);
2277 if (version_data
== NULL
) return CURLHELP_SSL_LIBRARY_UNKNOWN
;
2279 ssl_version
= strdup (version_data
->ssl_version
);
2280 if (ssl_version
== NULL
) return CURLHELP_SSL_LIBRARY_UNKNOWN
;
2282 library
= strtok (ssl_version
, "/");
2283 if (library
== NULL
) return CURLHELP_SSL_LIBRARY_UNKNOWN
;
2285 if (strcmp (library
, "OpenSSL") == 0)
2286 ssl_library
= CURLHELP_SSL_LIBRARY_OPENSSL
;
2287 else if (strcmp (library
, "LibreSSL") == 0)
2288 ssl_library
= CURLHELP_SSL_LIBRARY_LIBRESSL
;
2289 else if (strcmp (library
, "GnuTLS") == 0)
2290 ssl_library
= CURLHELP_SSL_LIBRARY_GNUTLS
;
2291 else if (strcmp (library
, "NSS") == 0)
2292 ssl_library
= CURLHELP_SSL_LIBRARY_NSS
;
2295 printf ("* SSL library string is : %s %s (%d)\n", version_data
->ssl_version
, library
, ssl_library
);
2303 curlhelp_get_ssl_library_string (curlhelp_ssl_library ssl_library
)
2305 switch (ssl_library
) {
2306 case CURLHELP_SSL_LIBRARY_OPENSSL
:
2308 case CURLHELP_SSL_LIBRARY_LIBRESSL
:
2310 case CURLHELP_SSL_LIBRARY_GNUTLS
:
2312 case CURLHELP_SSL_LIBRARY_NSS
:
2314 case CURLHELP_SSL_LIBRARY_UNKNOWN
:
2320 #ifdef LIBCURL_FEATURE_SSL
2323 parse_cert_date (const char *s
)
2331 /* Jan 17 14:25:12 2020 GMT */
2332 res
= strptime (s
, "%Y-%m-%d %H:%M:%S GMT", &tm
);
2333 /* Sep 11 12:00:00 2020 GMT */
2334 if (res
== NULL
) strptime (s
, "%Y %m %d %H:%M:%S GMT", &tm
);
2335 date
= mktime (&tm
);
2340 /* TODO: this needs cleanup in the sslutils.c, maybe we the #else case to
2341 * OpenSSL could be this function
2344 net_noopenssl_check_certificate (cert_ptr_union
* cert_ptr
, int days_till_exp_warn
, int days_till_exp_crit
)
2347 struct curl_slist
* slist
;
2348 int cname_found
= 0;
2349 char* start_date_str
= NULL
;
2350 char* end_date_str
= NULL
;
2357 char timestamp
[50] = "";
2358 int status
= STATE_UNKNOWN
;
2361 printf ("**** REQUEST CERTIFICATES ****\n");
2363 for (i
= 0; i
< cert_ptr
->to_certinfo
->num_of_certs
; i
++) {
2364 for (slist
= cert_ptr
->to_certinfo
->certinfo
[i
]; slist
; slist
= slist
->next
) {
2365 /* find first common name in subject,
2366 * TODO: check alternative subjects for
2367 * TODO: have a decent parser here and not a hack
2368 * multi-host certificate, check wildcards
2370 if (strncasecmp (slist
->data
, "Subject:", 8) == 0) {
2372 char* p
= strstr (slist
->data
, "CN=");
2375 p
= strstr (slist
->data
, "CN = ");
2378 if (strncmp (host_name
, p
+d
, strlen (host_name
)) == 0) {
2382 } else if (strncasecmp (slist
->data
, "Start Date:", 11) == 0) {
2383 start_date_str
= &slist
->data
[11];
2384 } else if (strncasecmp (slist
->data
, "Expire Date:", 12) == 0) {
2385 end_date_str
= &slist
->data
[12];
2386 } else if (strncasecmp (slist
->data
, "Cert:", 5) == 0) {
2387 goto HAVE_FIRST_CERT
;
2390 printf ("%d ** %s\n", i
, slist
->data
);
2396 printf ("**** REQUEST CERTIFICATES ****\n");
2399 printf("%s\n",_("CRITICAL - Cannot retrieve certificate subject."));
2400 return STATE_CRITICAL
;
2403 start_date
= parse_cert_date (start_date_str
);
2404 if (start_date
<= 0) {
2405 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("WARNING - Unparsable 'Start Date' in certificate: '%s'"),
2408 return STATE_WARNING
;
2411 end_date
= parse_cert_date (end_date_str
);
2412 if (end_date
<= 0) {
2413 snprintf (msg
, DEFAULT_BUFFER_SIZE
, _("WARNING - Unparsable 'Expire Date' in certificate: '%s'"),
2416 return STATE_WARNING
;
2419 time_left
= difftime (end_date
, time(NULL
));
2420 days_left
= time_left
/ 86400;
2422 setenv("TZ", "GMT", 1);
2424 strftime(timestamp
, 50, "%c %z", localtime(&end_date
));
2426 setenv("TZ", tz
, 1);
2431 if (days_left
> 0 && days_left
<= days_till_exp_warn
) {
2432 printf (_("%s - Certificate '%s' expires in %d day(s) (%s).\n"), (days_left
>days_till_exp_crit
)?"WARNING":"CRITICAL", host_name
, days_left
, timestamp
);
2433 if (days_left
> days_till_exp_crit
)
2434 status
= STATE_WARNING
;
2436 status
= STATE_CRITICAL
;
2437 } else if (days_left
== 0 && time_left
> 0) {
2438 if (time_left
>= 3600)
2439 time_remaining
= (int) time_left
/ 3600;
2441 time_remaining
= (int) time_left
/ 60;
2443 printf (_("%s - Certificate '%s' expires in %u %s (%s)\n"),
2444 (days_left
>days_till_exp_crit
) ? "WARNING" : "CRITICAL", host_name
, time_remaining
,
2445 time_left
>= 3600 ? "hours" : "minutes", timestamp
);
2447 if ( days_left
> days_till_exp_crit
)
2448 status
= STATE_WARNING
;
2450 status
= STATE_CRITICAL
;
2451 } else if (time_left
< 0) {
2452 printf(_("CRITICAL - Certificate '%s' expired on %s.\n"), host_name
, timestamp
);
2453 status
=STATE_CRITICAL
;
2454 } else if (days_left
== 0) {
2455 printf (_("%s - Certificate '%s' just expired (%s).\n"), (days_left
>days_till_exp_crit
)?"WARNING":"CRITICAL", host_name
, timestamp
);
2456 if (days_left
> days_till_exp_crit
)
2457 status
= STATE_WARNING
;
2459 status
= STATE_CRITICAL
;
2461 printf(_("OK - Certificate '%s' will expire on %s.\n"), host_name
, timestamp
);
2466 #endif /* USE_OPENSSL */
2467 #endif /* LIBCURL_FEATURE_SSL */