b0df960c3032a4d441e579e79dc70d483cf0dcf2
1 #! /usr/bin/perl -w -I ..
2 #
3 # Test check_http by having an actual HTTP server running
4 #
5 # To create the https server certificate:
6 # openssl req -new -x509 -keyout server-key.pem -out server-cert.pem -days 3650 -nodes
7 # Country Name (2 letter code) [AU]:UK
8 # State or Province Name (full name) [Some-State]:Derbyshire
9 # Locality Name (eg, city) []:Belper
10 # Organization Name (eg, company) [Internet Widgits Pty Ltd]:Nagios Plugins
11 # Organizational Unit Name (eg, section) []:
12 # Common Name (eg, YOUR name) []:Ton Voon
13 # Email Address []:tonvoon@mac.com
16 use strict;
17 use Test::More;
18 use NPTest;
19 use FindBin qw($Bin);
21 use HTTP::Daemon;
22 use HTTP::Status;
23 use HTTP::Response;
25 my $servers = { http => 0 }; # HTTP::Daemon should always be available
26 eval { require HTTP::Daemon::SSL };
27 if ($@) {
28 diag "Cannot load HTTP::Daemon::SSL: $@";
29 } else {
30 $servers->{https} = 0;
31 }
33 # set a fixed version, so the header size doesn't vary
34 $HTTP::Daemon::VERSION = "1.00";
36 my $port_http = 50000 + int(rand(1000));
37 my $port_https = $port_http + 1;
38 my $port_https_expired = $port_http + 2;
40 # This array keeps sockets around for implementing timeouts
41 my @persist;
43 # Start up all servers
44 my @pids;
45 my $pid = fork();
46 if ($pid) {
47 # Parent
48 push @pids, $pid;
49 if (exists $servers->{https}) {
50 # Fork a normal HTTPS server
51 $pid = fork();
52 if ($pid) {
53 # Parent
54 push @pids, $pid;
55 # Fork an expired cert server
56 $pid = fork();
57 if ($pid) {
58 push @pids, $pid;
59 } else {
60 my $d = HTTP::Daemon::SSL->new(
61 LocalPort => $port_https_expired,
62 LocalAddr => "127.0.0.1",
63 SSL_cert_file => "$Bin/certs/expired-cert.pem",
64 SSL_key_file => "$Bin/certs/expired-key.pem",
65 ) || die;
66 print "Please contact https expired at: <URL:", $d->url, ">\n";
67 run_server( $d );
68 exit;
69 }
70 } else {
71 my $d = HTTP::Daemon::SSL->new(
72 LocalPort => $port_https,
73 LocalAddr => "127.0.0.1",
74 SSL_cert_file => "$Bin/certs/server-cert.pem",
75 SSL_key_file => "$Bin/certs/server-key.pem",
76 ) || die;
77 print "Please contact https at: <URL:", $d->url, ">\n";
78 run_server( $d );
79 exit;
80 }
81 }
82 # give our webservers some time to startup
83 sleep(1);
84 } else {
85 # Child
86 #print "child\n";
87 my $d = HTTP::Daemon->new(
88 LocalPort => $port_http,
89 LocalAddr => "127.0.0.1",
90 ) || die;
91 print "Please contact http at: <URL:", $d->url, ">\n";
92 run_server( $d );
93 exit;
94 }
96 # Run the same server on http and https
97 sub run_server {
98 my $d = shift;
99 MAINLOOP: while (my $c = $d->accept ) {
100 while (my $r = $c->get_request) {
101 if ($r->method eq "GET" and $r->url->path =~ m^/statuscode/(\d+)^) {
102 $c->send_basic_header($1);
103 $c->send_crlf;
104 } elsif ($r->method eq "GET" and $r->url->path =~ m^/file/(.*)^) {
105 $c->send_basic_header;
106 $c->send_crlf;
107 $c->send_file_response("$Bin/var/$1");
108 } elsif ($r->method eq "GET" and $r->url->path eq "/slow") {
109 $c->send_basic_header;
110 $c->send_crlf;
111 sleep 1;
112 $c->send_response("slow");
113 } elsif ($r->url->path eq "/method") {
114 if ($r->method eq "DELETE") {
115 $c->send_error(RC_METHOD_NOT_ALLOWED);
116 } elsif ($r->method eq "foo") {
117 $c->send_error(RC_NOT_IMPLEMENTED);
118 } else {
119 $c->send_status_line(200, $r->method);
120 }
121 } elsif ($r->url->path eq "/postdata") {
122 $c->send_basic_header;
123 $c->send_crlf;
124 $c->send_response($r->method.":".$r->content);
125 } elsif ($r->url->path eq "/redirect") {
126 $c->send_redirect( "/redirect2" );
127 } elsif ($r->url->path eq "/redir_external") {
128 $c->send_redirect( "http://169.254.169.254/redirect2" );
129 } elsif ($r->url->path eq "/redirect2") {
130 $c->send_basic_header;
131 $c->send_crlf;
132 $c->send_response("redirected");
133 } elsif ($r->url->path eq "/redir_timeout") {
134 $c->send_redirect( "/timeout" );
135 } elsif ($r->url->path eq "/timeout") {
136 # Keep $c from being destroyed, but prevent severe leaks
137 unshift @persist, $c;
138 delete($persist[1000]);
139 next MAINLOOP;
140 } else {
141 $c->send_error(RC_FORBIDDEN);
142 }
143 $c->close;
144 }
145 }
146 }
148 END {
149 foreach my $pid (@pids) {
150 if ($pid) { print "Killing $pid\n"; kill "INT", $pid }
151 }
152 };
154 if ($ARGV[0] && $ARGV[0] eq "-d") {
155 while (1) {
156 sleep 100;
157 }
158 }
160 my $common_tests = 55;
161 my $ssl_only_tests = 6;
162 if (-x "./check_http") {
163 plan tests => $common_tests * 2 + $ssl_only_tests;
164 } else {
165 plan skip_all => "No check_http compiled";
166 }
168 my $result;
169 my $command = "./check_http -H 127.0.0.1";
171 run_common_tests( { command => "$command -p $port_http" } );
172 SKIP: {
173 skip "HTTP::Daemon::SSL not installed", $common_tests + $ssl_only_tests if ! exists $servers->{https};
174 run_common_tests( { command => "$command -p $port_https", ssl => 1 } );
176 $result = NPTest->testCmd( "$command -p $port_https -S -C 14" );
177 is( $result->return_code, 0, "$command -p $port_https -S -C 14" );
178 is( $result->output, 'OK - Certificate will expire on 03/03/2019 21:41.', "output ok" );
180 $result = NPTest->testCmd( "$command -p $port_https -S -C 14000" );
181 is( $result->return_code, 1, "$command -p $port_https -S -C 14000" );
182 like( $result->output, '/WARNING - Certificate expires in \d+ day\(s\) \(03/03/2019 21:41\)./', "output ok" );
185 # Expired cert tests
186 $result = NPTest->testCmd( "$command -p $port_https_expired -S -C 7" );
187 is( $result->return_code, 2, "$command -p $port_https_expired -S -C 7" );
188 is( $result->output,
189 'CRITICAL - Certificate expired on 03/05/2009 00:13.',
190 "output ok" );
192 }
194 sub run_common_tests {
195 my ($opts) = @_;
196 my $command = $opts->{command};
197 if ($opts->{ssl}) {
198 $command .= " --ssl";
199 }
201 $result = NPTest->testCmd( "$command -u /file/root" );
202 is( $result->return_code, 0, "/file/root");
203 like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - 274 bytes in [\d\.]+ second/', "Output correct" );
205 $result = NPTest->testCmd( "$command -u /file/root -s Root" );
206 is( $result->return_code, 0, "/file/root search for string");
207 like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - 274 bytes in [\d\.]+ second/', "Output correct" );
210 my $cmd;
211 $cmd = "$command -u /slow";
212 $result = NPTest->testCmd( $cmd );
213 is( $result->return_code, 0, "$cmd");
214 like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
215 $result->output =~ /in ([\d\.]+) second/;
216 cmp_ok( $1, ">", 1, "Time is > 1 second" );
218 $cmd = "$command -u /statuscode/200";
219 $result = NPTest->testCmd( $cmd );
220 is( $result->return_code, 0, $cmd);
221 like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
223 $cmd = "$command -u /statuscode/200 -e 200";
224 $result = NPTest->testCmd( $cmd );
225 is( $result->return_code, 0, $cmd);
226 like( $result->output, '/^HTTP OK: Status line output matched "200" - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
228 $cmd = "$command -u /statuscode/201";
229 $result = NPTest->testCmd( $cmd );
230 is( $result->return_code, 0, $cmd);
231 like( $result->output, '/^HTTP OK: HTTP/1.1 201 Created - \d+ bytes in [\d\.]+ second /', "Output correct: ".$result->output );
233 $cmd = "$command -u /statuscode/201 -e 201";
234 $result = NPTest->testCmd( $cmd );
235 is( $result->return_code, 0, $cmd);
236 like( $result->output, '/^HTTP OK: Status line output matched "201" - \d+ bytes in [\d\.]+ second /', "Output correct: ".$result->output );
238 $cmd = "$command -u /statuscode/201 -e 200";
239 $result = NPTest->testCmd( $cmd );
240 is( $result->return_code, 2, $cmd);
241 like( $result->output, '/^HTTP CRITICAL - Invalid HTTP response received from host on port \d+: HTTP/1.1 201 Created/', "Output correct: ".$result->output );
243 $cmd = "$command -u /statuscode/200 -e 200,201,202";
244 $result = NPTest->testCmd( $cmd );
245 is( $result->return_code, 0, $cmd);
246 like( $result->output, '/^HTTP OK: Status line output matched "200,201,202" - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
248 $cmd = "$command -u /statuscode/201 -e 200,201,202";
249 $result = NPTest->testCmd( $cmd );
250 is( $result->return_code, 0, $cmd);
251 like( $result->output, '/^HTTP OK: Status line output matched "200,201,202" - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
253 $cmd = "$command -u /statuscode/203 -e 200,201,202";
254 $result = NPTest->testCmd( $cmd );
255 is( $result->return_code, 2, $cmd);
256 like( $result->output, '/^HTTP CRITICAL - Invalid HTTP response received from host on port (\d+): HTTP/1.1 203 Non-Authoritative Information/', "Output correct: ".$result->output );
258 $cmd = "$command -j HEAD -u /method";
259 $result = NPTest->testCmd( $cmd );
260 is( $result->return_code, 0, $cmd);
261 like( $result->output, '/^HTTP OK: HTTP/1.1 200 HEAD - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
263 $cmd = "$command -j POST -u /method";
264 $result = NPTest->testCmd( $cmd );
265 is( $result->return_code, 0, $cmd);
266 like( $result->output, '/^HTTP OK: HTTP/1.1 200 POST - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
268 $cmd = "$command -j GET -u /method";
269 $result = NPTest->testCmd( $cmd );
270 is( $result->return_code, 0, $cmd);
271 like( $result->output, '/^HTTP OK: HTTP/1.1 200 GET - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
273 $cmd = "$command -u /method";
274 $result = NPTest->testCmd( $cmd );
275 is( $result->return_code, 0, $cmd);
276 like( $result->output, '/^HTTP OK: HTTP/1.1 200 GET - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
278 $cmd = "$command -P foo -u /method";
279 $result = NPTest->testCmd( $cmd );
280 is( $result->return_code, 0, $cmd);
281 like( $result->output, '/^HTTP OK: HTTP/1.1 200 POST - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
283 $cmd = "$command -j DELETE -u /method";
284 $result = NPTest->testCmd( $cmd );
285 is( $result->return_code, 1, $cmd);
286 like( $result->output, '/^HTTP WARNING: HTTP/1.1 405 Method Not Allowed/', "Output correct: ".$result->output );
288 $cmd = "$command -j foo -u /method";
289 $result = NPTest->testCmd( $cmd );
290 is( $result->return_code, 2, $cmd);
291 like( $result->output, '/^HTTP CRITICAL: HTTP/1.1 501 Not Implemented/', "Output correct: ".$result->output );
293 $cmd = "$command -P stufftoinclude -u /postdata -s POST:stufftoinclude";
294 $result = NPTest->testCmd( $cmd );
295 is( $result->return_code, 0, $cmd);
296 like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
298 $cmd = "$command -j PUT -P stufftoinclude -u /postdata -s PUT:stufftoinclude";
299 $result = NPTest->testCmd( $cmd );
300 is( $result->return_code, 0, $cmd);
301 like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
303 # To confirm that the free doesn't segfault
304 $cmd = "$command -P stufftoinclude -j PUT -u /postdata -s PUT:stufftoinclude";
305 $result = NPTest->testCmd( $cmd );
306 is( $result->return_code, 0, $cmd);
307 like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
309 $cmd = "$command -u /redirect";
310 $result = NPTest->testCmd( $cmd );
311 is( $result->return_code, 0, $cmd);
312 like( $result->output, '/^HTTP OK: HTTP/1.1 301 Moved Permanently - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
314 $cmd = "$command -f follow -u /redirect";
315 $result = NPTest->testCmd( $cmd );
316 is( $result->return_code, 0, $cmd);
317 like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
320 $cmd = "$command -u /redirect -k 'follow: me'";
321 $result = NPTest->testCmd( $cmd );
322 is( $result->return_code, 0, $cmd);
323 like( $result->output, '/^HTTP OK: HTTP/1.1 301 Moved Permanently - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
325 $cmd = "$command -f follow -u /redirect -k 'follow: me'";
326 $result = NPTest->testCmd( $cmd );
327 is( $result->return_code, 0, $cmd);
328 like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
330 # These tests may block
331 print "ALRM\n";
333 $cmd = "$command -f sticky -u /redir_external -t 5";
334 eval {
335 local $SIG{ALRM} = sub { die "alarm\n" };
336 alarm(2);
337 $result = NPTest->testCmd( $cmd );
338 alarm(0); };
339 isnt( $@, "alarm\n", $cmd);
341 # Will this one work everywhere???
342 $cmd = "$command -f follow -u /redir_external -t 5";
343 eval {
344 local $SIG{ALRM} = sub { die "alarm\n" };
345 alarm(2);
346 $result = NPTest->testCmd( $cmd );
347 alarm(0); };
348 is( $@, "alarm\n", $cmd);
350 $cmd = "$command -u /timeout -t 5";
351 eval {
352 local $SIG{ALRM} = sub { die "alarm\n" };
353 alarm(2);
354 $result = NPTest->testCmd( $cmd );
355 alarm(0); };
356 is( $@, "alarm\n", $cmd);
358 $cmd = "$command -f follow -u /redir_timeout -t 2";
359 eval {
360 local $SIG{ALRM} = sub { die "alarm\n" };
361 alarm(5);
362 $result = NPTest->testCmd( $cmd );
363 alarm(0); };
364 isnt( $@, "alarm\n", $cmd);
366 }