summary | shortlog | log | commit | commitdiff | tree
raw | patch | inline | side by side (parent: e2a4f7f)
raw | patch | inline | side by side (parent: e2a4f7f)
author | Karl DeBisschop <kdebisschop@users.sourceforge.net> | |
Wed, 25 Sep 2002 07:58:08 +0000 (07:58 +0000) | ||
committer | Karl DeBisschop <kdebisschop@users.sourceforge.net> | |
Wed, 25 Sep 2002 07:58:08 +0000 (07:58 +0000) |
git-svn-id: https://nagiosplug.svn.sourceforge.net/svnroot/nagiosplug/nagiosplug/trunk@103 f882894a-f735-0410-b71e-b25c423dba1c
plugins/check_http.c | patch | blob | history |
diff --git a/plugins/check_http.c b/plugins/check_http.c
index 306e4a2e4a9f9006fdc80cd249c57586a0b9dc55..733388b8dfbca3a250879e3fa6d28a95b185e0a3 100644 (file)
--- a/plugins/check_http.c
+++ b/plugins/check_http.c
#define HTTP_EXPECT "HTTP/1."
#define HTTP_URL "/"
-char timestamp[10] = "";
+char timestamp[17] = "";
int specify_port = FALSE;
int server_port = HTTP_PORT;
char server_port_text[6] = "";
regexp[MAX_RE_SIZE - 1] = 0;
errcode = regcomp (&preg, regexp, cflags);
if (errcode != 0) {
- regerror (errcode, &preg, errbuf, MAX_INPUT_BUFFER);
+ (void) regerror (errcode, &preg, errbuf, MAX_INPUT_BUFFER);
printf ("Could Not Compile Regular Expression: %s", errbuf);
return ERROR;
}
int i = 0;
size_t pagesize = 0;
char *full_page = NULL;
+ char *buf = NULL;
char *pos = NULL;
+ char *x = NULL;
+ char *orig_url = NULL;
/* try to connect to the host at the given port number */
#ifdef HAVE_SSL
return STATE_CRITICAL;
}
- snprintf (buffer, MAX_INPUT_BUFFER - 1, "%s %s HTTP/1.0\r\n", http_method, server_url);
- if (SSL_write (ssl, buffer, strlen (buffer)) == -1) {
+ buf = ssprintf (buf, "%s %s HTTP/1.0\r\n", http_method, server_url);
+ if (SSL_write (ssl, buf, strlen (buf)) == -1) {
ERR_print_errors_fp (stderr);
return STATE_CRITICAL;
}
/* optionally send the host header info (not clear if it's usable) */
if (strcmp (host_name, "")) {
- snprintf (buffer, MAX_INPUT_BUFFER - 1, "Host: %s\r\n", host_name);
- if (SSL_write (ssl, buffer, strlen (buffer)) == -1) {
+ buf = ssprintf (buf, "Host: %s\r\n", host_name);
+ if (SSL_write (ssl, buf, strlen (buf)) == -1) {
ERR_print_errors_fp (stderr);
return STATE_CRITICAL;
}
}
/* send user agent */
- snprintf (buffer, MAX_INPUT_BUFFER - 1, "User-Agent: check_http/%s (nagios-plugins %s)\r\n",
+ buf = ssprintf (buf, "User-Agent: check_http/%s (nagios-plugins %s)\r\n",
clean_revstring (REVISION), PACKAGE_VERSION);
- if (SSL_write (ssl, buffer, strlen (buffer)) == -1) {
+ if (SSL_write (ssl, buf, strlen (buf)) == -1) {
ERR_print_errors_fp (stderr);
return STATE_CRITICAL;
}
/* optionally send the authentication info */
if (strcmp (user_auth, "")) {
auth = base64 (user_auth, strlen (user_auth));
- snprintf (buffer, MAX_INPUT_BUFFER - 1, "Authorization: Basic %s\r\n", auth);
- if (SSL_write (ssl, buffer, strlen (buffer)) == -1) {
+ buf = ssprintf (buf, "Authorization: Basic %s\r\n", auth);
+ if (SSL_write (ssl, buf, strlen (buf)) == -1) {
ERR_print_errors_fp (stderr);
return STATE_CRITICAL;
}
/* optionally send http POST data */
if (http_post_data) {
- snprintf (buffer, MAX_INPUT_BUFFER - 1, "Content-Type: application/x-www-form-urlencoded\r\n");
- if (SSL_write (ssl, buffer, strlen (buffer)) == -1) {
+ buf = ssprintf (buf, "Content-Type: application/x-www-form-urlencoded\r\n");
+ if (SSL_write (ssl, buf, strlen (buf)) == -1) {
ERR_print_errors_fp (stderr);
return STATE_CRITICAL;
}
- snprintf (buffer, MAX_INPUT_BUFFER - 1, "Content-Length: %i\r\n\r\n", strlen (http_post_data));
- if (SSL_write (ssl, buffer, strlen (buffer)) == -1) {
+ buf = ssprintf (buf, "Content-Length: %i\r\n\r\n", strlen (http_post_data));
+ if (SSL_write (ssl, buf, strlen (buf)) == -1) {
ERR_print_errors_fp (stderr);
return STATE_CRITICAL;
}
}
/* send a newline so the server knows we're done with the request */
- snprintf (buffer, MAX_INPUT_BUFFER - 1, "\r\n\r\n");
- if (SSL_write (ssl, buffer, strlen (buffer)) == -1) {
+ buf = ssprintf (buf, "\r\n\r\n");
+ if (SSL_write (ssl, buf, strlen (buf)) == -1) {
ERR_print_errors_fp (stderr);
return STATE_CRITICAL;
}
msg = ssprintf (msg, "Unable to open TCP socket");
terminate (STATE_CRITICAL, msg);
}
- snprintf (buffer, MAX_INPUT_BUFFER - 1, "%s %s HTTP/1.0\r\n", http_method, server_url);
- send (sd, buffer, strlen (buffer), 0);
+ buf = ssprintf (buf, "%s %s HTTP/1.0\r\n", http_method, server_url);
+ send (sd, buf, strlen (buf), 0);
/* optionally send the host header info */
if (strcmp (host_name, "")) {
- snprintf (buffer, MAX_INPUT_BUFFER - 1, "Host: %s\r\n", host_name);
- send (sd, buffer, strlen (buffer), 0);
+ buf = ssprintf (buf, "Host: %s\r\n", host_name);
+ send (sd, buf, strlen (buf), 0);
}
/* send user agent */
- snprintf (buffer, MAX_INPUT_BUFFER - 1,
+ buf = ssprintf (buf,
"User-Agent: check_http/%s (nagios-plugins %s)\r\n",
clean_revstring (REVISION), PACKAGE_VERSION);
- send (sd, buffer, strlen (buffer), 0);
+ send (sd, buf, strlen (buf), 0);
/* optionally send the authentication info */
if (strcmp (user_auth, "")) {
auth = base64 (user_auth, strlen (user_auth));
- snprintf (buffer, MAX_INPUT_BUFFER - 1, "Authorization: Basic %s\r\n", auth);
- send (sd, buffer, strlen (buffer), 0);
+ buf = ssprintf (buf, "Authorization: Basic %s\r\n", auth);
+ send (sd, buf, strlen (buf), 0);
}
/* optionally send http POST data */
/* written by Chris Henesy <lurker@shadowtech.org> */
if (http_post_data) {
- snprintf (buffer, MAX_INPUT_BUFFER - 1, "Content-Type: application/x-www-form-urlencoded\r\n");
- send (sd, buffer, strlen (buffer), 0);
- snprintf (buffer, MAX_INPUT_BUFFER - 1, "Content-Length: %i\r\n\r\n", strlen (http_post_data));
- send (sd, buffer, strlen (buffer), 0);
+ buf = ssprintf (buf, "Content-Type: application/x-www-form-urlencoded\r\n");
+ send (sd, buf, strlen (buf), 0);
+ buf = ssprintf (buf, "Content-Length: %i\r\n\r\n", strlen (http_post_data));
+ send (sd, buf, strlen (buf), 0);
http_post_data = strscat (http_post_data, "\r\n");
send (sd, http_post_data, strlen (http_post_data), 0);
}
/* send a newline so the server knows we're done with the request */
- snprintf (buffer, MAX_INPUT_BUFFER - 1, "\r\n\r\n");
- send (sd, buffer, strlen (buffer), 0);
+ buf = ssprintf (buf, "\r\n\r\n");
+ send (sd, buf, strlen (buf), 0);
#ifdef HAVE_SSL
}
#endif
strstr (status_line, "303") ||
strstr (status_line, "304")) {
if (onredirect == STATE_DEPENDENT) {
-
+
+ orig_url = strscpy(NULL, server_url);
pos = header;
while (pos) {
server_address = realloc (server_address, MAX_IPV4_HOSTLENGTH);
if (server_address == NULL)
terminate (STATE_UNKNOWN,
"HTTP UNKNOWN: could not allocate server_address");
- if (strspn (pos, "\r\n") > server_url_length) {
- server_url = realloc (server_url, strspn (pos, "\r\n"));
+ if (strcspn (pos, "\r\n") > server_url_length) {
+ server_url = realloc (server_url, strcspn (pos, "\r\n"));
if (server_url == NULL)
terminate (STATE_UNKNOWN,
- "HTTP UNKNOWN: could not allocate server_url");
- server_url_length = strspn (pos, "\r\n");
+ "HTTP UNKNOWN: could not allocate server_url");
+ server_url_length = strcspn (pos, "\r\n");
}
if (sscanf (pos, HDR_LOCATION URI_HTTP URI_HOST URI_PORT URI_PATH, server_type, server_address, server_port_text, server_url) == 4) {
host_name = strscpy (host_name, server_address);
server_port = server_port_check (use_ssl);
check_http ();
}
- else if (sscanf (pos, HDR_LOCATION URI_PATH, server_url) == 1) {
+ else if (sscanf (pos, HDR_LOCATION URI_PATH, server_url) == 1) {
+ if ((server_url[0] != '/') && (x = strrchr(orig_url, '/'))) {
+ *x = '\0';
+ server_url = ssprintf (server_url, "%s/%s", orig_url, server_url);
+ }
check_http ();
- }
+ }
pos += (size_t) strcspn (pos, "\r\n");
pos += (size_t) strspn (pos, "\r\n");
} /* end while (pos) */
int offset;
struct tm stamp;
int days_left;
- /* int result = STATE_OK; */
- /* char timestamp[14]; */
/* Retrieve timestamp of certificate */
days_left = (mktime (&stamp) - time (NULL)) / 86400;
snprintf
- (timestamp, MAX_INPUT_BUFFER - 1, "%02d/%02d/%04d %02d:%02d",
+ (timestamp, 16, "%02d/%02d/%04d %02d:%02d",
stamp.tm_mon + 1,
stamp.tm_mday, stamp.tm_year + 1900, stamp.tm_hour, stamp.tm_min);