check_http.t 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440
  1. #! /usr/bin/perl -w -I ..
  2. #
  3. # Test check_http by having an actual HTTP server running
  4. #
  5. # To create the https server certificate:
  6. # openssl req -new -x509 -keyout server-key.pem -out server-cert.pem -days 3650 -nodes
  7. # Country Name (2 letter code) [AU]:UK
  8. # State or Province Name (full name) [Some-State]:Derbyshire
  9. # Locality Name (eg, city) []:Belper
  10. # Organization Name (eg, company) [Internet Widgits Pty Ltd]:Nagios Plugins
  11. # Organizational Unit Name (eg, section) []:
  12. # Common Name (eg, YOUR name) []:Ton Voon
  13. # Email Address []:tonvoon@mac.com
  14. use strict;
  15. use Test::More;
  16. use NPTest;
  17. use FindBin qw($Bin);
  18. my $common_tests = 72;
  19. my $ssl_only_tests = 8;
  20. # Check that all dependent modules are available
  21. eval {
  22. require HTTP::Daemon;
  23. require HTTP::Status;
  24. require HTTP::Response;
  25. };
  26. if ($@) {
  27. plan skip_all => "Missing required module for test: $@";
  28. } else {
  29. if (-x "./check_http") {
  30. plan tests => $common_tests * 2 + $ssl_only_tests;
  31. } else {
  32. plan skip_all => "No check_http compiled";
  33. }
  34. }
  35. my $servers = { http => 0 }; # HTTP::Daemon should always be available
  36. eval { require HTTP::Daemon::SSL };
  37. if ($@) {
  38. diag "Cannot load HTTP::Daemon::SSL: $@";
  39. } else {
  40. $servers->{https} = 0;
  41. }
  42. # set a fixed version, so the header size doesn't vary
  43. $HTTP::Daemon::VERSION = "1.00";
  44. my $port_http = 50000 + int(rand(1000));
  45. my $port_https = $port_http + 1;
  46. my $port_https_expired = $port_http + 2;
  47. # This array keeps sockets around for implementing timeouts
  48. my @persist;
  49. # Helper for returning chunked responses
  50. our $ckn = 0;
  51. sub chunked_resp {
  52. $ckn++;
  53. return "foo" if ($ckn < 2);
  54. return "bar" if ($ckn < 3);
  55. return "baz" if ($ckn < 4);
  56. return "\n" if ($ckn < 5);
  57. $ckn = 0 if ($ckn < 6);
  58. return undef;
  59. }
  60. # Start up all servers
  61. my @pids;
  62. my $pid = fork();
  63. if ($pid) {
  64. # Parent
  65. push @pids, $pid;
  66. if (exists $servers->{https}) {
  67. # Fork a normal HTTPS server
  68. $pid = fork();
  69. if ($pid) {
  70. # Parent
  71. push @pids, $pid;
  72. # Fork an expired cert server
  73. $pid = fork();
  74. if ($pid) {
  75. push @pids, $pid;
  76. } else {
  77. my $d = HTTP::Daemon::SSL->new(
  78. LocalPort => $port_https_expired,
  79. LocalAddr => "127.0.0.1",
  80. ReuseAddr => 1,
  81. SSL_cert_file => "$Bin/certs/expired-cert.pem",
  82. SSL_key_file => "$Bin/certs/expired-key.pem",
  83. ) || die;
  84. print "Please contact https expired at: <URL:", $d->url, ">\n";
  85. run_server( $d );
  86. exit;
  87. }
  88. } else {
  89. my $d = HTTP::Daemon::SSL->new(
  90. LocalPort => $port_https,
  91. LocalAddr => "127.0.0.1",
  92. ReuseAddr => 1,
  93. SSL_cert_file => "$Bin/certs/server-cert.pem",
  94. SSL_key_file => "$Bin/certs/server-key.pem",
  95. ) || die;
  96. print "Please contact https at: <URL:", $d->url, ">\n";
  97. run_server( $d );
  98. exit;
  99. }
  100. }
  101. # give our webservers some time to startup
  102. sleep(1);
  103. } else {
  104. # Child
  105. #print "child\n";
  106. my $d = HTTP::Daemon->new(
  107. LocalPort => $port_http,
  108. LocalAddr => "127.0.0.1",
  109. ReuseAddr => 1,
  110. ) || die;
  111. print "Please contact http at: <URL:", $d->url, ">\n";
  112. run_server( $d );
  113. exit;
  114. }
  115. # Run the same server on http and https
  116. sub run_server {
  117. my $d = shift;
  118. MAINLOOP: while (my $c = $d->accept ) {
  119. while (my $r = $c->get_request) {
  120. if ($r->method eq "GET" and $r->url->path =~ m^/statuscode/(\d+)^) {
  121. $c->send_basic_header($1);
  122. $c->send_crlf;
  123. } elsif ($r->method eq "GET" and $r->url->path =~ m^/file/(.*)^) {
  124. $c->send_basic_header;
  125. $c->send_crlf;
  126. $c->send_file_response("$Bin/var/$1");
  127. } elsif ($r->method eq "GET" and $r->url->path eq "/slow") {
  128. $c->send_basic_header;
  129. $c->send_crlf;
  130. sleep 1;
  131. $c->send_response("slow");
  132. } elsif ($r->method eq "GET" and $r->url->path eq "/chunked") {
  133. $c->send_response(HTTP::Response->new(200, 'OK', undef, \&chunked_resp));
  134. } elsif ($r->url->path eq "/method") {
  135. if ($r->method eq "DELETE") {
  136. $c->send_error(HTTP::Status->RC_METHOD_NOT_ALLOWED);
  137. } elsif ($r->method eq "foo") {
  138. $c->send_error(HTTP::Status->RC_NOT_IMPLEMENTED);
  139. } else {
  140. $c->send_status_line(200, $r->method);
  141. }
  142. } elsif ($r->url->path eq "/postdata") {
  143. $c->send_basic_header;
  144. $c->send_crlf;
  145. $c->send_response($r->method.":".$r->content);
  146. } elsif ($r->url->path eq "/redirect") {
  147. $c->send_redirect( "/redirect2" );
  148. } elsif ($r->url->path eq "/redir_external") {
  149. $c->send_redirect(($d->isa('HTTP::Daemon::SSL') ? "https" : "http") . "://169.254.169.254/redirect2" );
  150. } elsif ($r->url->path eq "/redirect2") {
  151. $c->send_basic_header;
  152. $c->send_crlf;
  153. $c->send_response(HTTP::Response->new( 200, 'OK', undef, 'redirected' ));
  154. } elsif ($r->url->path eq "/redir_timeout") {
  155. $c->send_redirect( "/timeout" );
  156. } elsif ($r->url->path eq "/timeout") {
  157. # Keep $c from being destroyed, but prevent severe leaks
  158. unshift @persist, $c;
  159. delete($persist[1000]);
  160. next MAINLOOP;
  161. } elsif ($r->url->path eq "/header_check") {
  162. $c->send_basic_header;
  163. $c->send_header('foo');
  164. $c->send_crlf;
  165. } else {
  166. $c->send_error(HTTP::Status->RC_FORBIDDEN);
  167. }
  168. $c->close;
  169. }
  170. }
  171. }
  172. END {
  173. foreach my $pid (@pids) {
  174. if ($pid) { print "Killing $pid\n"; kill "INT", $pid }
  175. }
  176. };
  177. if ($ARGV[0] && $ARGV[0] eq "-d") {
  178. while (1) {
  179. sleep 100;
  180. }
  181. }
  182. my $result;
  183. my $command = "./check_http -H 127.0.0.1";
  184. run_common_tests( { command => "$command -p $port_http" } );
  185. SKIP: {
  186. skip "HTTP::Daemon::SSL not installed", $common_tests + $ssl_only_tests if ! exists $servers->{https};
  187. run_common_tests( { command => "$command -p $port_https", ssl => 1 } );
  188. $result = NPTest->testCmd( "$command -p $port_https -S -C 14" );
  189. is( $result->return_code, 0, "$command -p $port_https -S -C 14" );
  190. is( $result->output, 'OK - Certificate \'Ton Voon\' will expire on Sun Mar 3 21:41:00 2019.', "output ok" );
  191. $result = NPTest->testCmd( "$command -p $port_https -S -C 14000" );
  192. is( $result->return_code, 1, "$command -p $port_https -S -C 14000" );
  193. like( $result->output, '/WARNING - Certificate \'Ton Voon\' expires in \d+ day\(s\) \(Sun Mar 3 21:41:00 2019\)./', "output ok" );
  194. # Expired cert tests
  195. $result = NPTest->testCmd( "$command -p $port_https -S -C 13960,14000" );
  196. is( $result->return_code, 2, "$command -p $port_https -S -C 13960,14000" );
  197. like( $result->output, '/CRITICAL - Certificate \'Ton Voon\' expires in \d+ day\(s\) \(Sun Mar 3 21:41:00 2019\)./', "output ok" );
  198. $result = NPTest->testCmd( "$command -p $port_https_expired -S -C 7" );
  199. is( $result->return_code, 2, "$command -p $port_https_expired -S -C 7" );
  200. is( $result->output,
  201. 'CRITICAL - Certificate \'Ton Voon\' expired on Thu Mar 5 00:13:00 2009.',
  202. "output ok" );
  203. }
  204. sub run_common_tests {
  205. my ($opts) = @_;
  206. my $command = $opts->{command};
  207. if ($opts->{ssl}) {
  208. $command .= " --ssl";
  209. }
  210. $result = NPTest->testCmd( "$command -u /file/root" );
  211. is( $result->return_code, 0, "/file/root");
  212. like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - 274 bytes in [\d\.]+ second/', "Output correct" );
  213. $result = NPTest->testCmd( "$command -u /file/root -s Root" );
  214. is( $result->return_code, 0, "/file/root search for string");
  215. like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - 274 bytes in [\d\.]+ second/', "Output correct" );
  216. $result = NPTest->testCmd( "$command -u /file/root -s NonRoot" );
  217. is( $result->return_code, 2, "Missing string check");
  218. like( $result->output, qr%^HTTP CRITICAL: HTTP/1\.1 200 OK - string 'NonRoot' not found on 'https?://127\.0\.0\.1:\d+/file/root'%, "Shows search string and location");
  219. $result = NPTest->testCmd( "$command -u /file/root -s NonRootWithOver30charsAndMoreFunThanAWetFish" );
  220. is( $result->return_code, 2, "Missing string check");
  221. like( $result->output, qr%HTTP CRITICAL: HTTP/1\.1 200 OK - string 'NonRootWithOver30charsAndM...' not found on 'https?://127\.0\.0\.1:\d+/file/root'%, "Shows search string and location");
  222. $result = NPTest->testCmd( "$command -u /header_check -d foo" );
  223. is( $result->return_code, 0, "header_check search for string");
  224. like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - 96 bytes in [\d\.]+ second/', "Output correct" );
  225. $result = NPTest->testCmd( "$command -u /header_check -d bar" );
  226. is( $result->return_code, 2, "Missing header string check");
  227. like( $result->output, qr%^HTTP CRITICAL: HTTP/1\.1 200 OK - header 'bar' not found on 'https?://127\.0\.0\.1:\d+/header_check'%, "Shows search string and location");
  228. my $cmd;
  229. $cmd = "$command -u /slow";
  230. $result = NPTest->testCmd( $cmd );
  231. is( $result->return_code, 0, "$cmd");
  232. like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  233. $result->output =~ /in ([\d\.]+) second/;
  234. cmp_ok( $1, ">", 1, "Time is > 1 second" );
  235. $cmd = "$command -u /statuscode/200";
  236. $result = NPTest->testCmd( $cmd );
  237. is( $result->return_code, 0, $cmd);
  238. like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  239. $cmd = "$command -u /statuscode/200 -e 200";
  240. $result = NPTest->testCmd( $cmd );
  241. is( $result->return_code, 0, $cmd);
  242. like( $result->output, '/^HTTP OK: Status line output matched "200" - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  243. $cmd = "$command -u /statuscode/201";
  244. $result = NPTest->testCmd( $cmd );
  245. is( $result->return_code, 0, $cmd);
  246. like( $result->output, '/^HTTP OK: HTTP/1.1 201 Created - \d+ bytes in [\d\.]+ second /', "Output correct: ".$result->output );
  247. $cmd = "$command -u /statuscode/201 -e 201";
  248. $result = NPTest->testCmd( $cmd );
  249. is( $result->return_code, 0, $cmd);
  250. like( $result->output, '/^HTTP OK: Status line output matched "201" - \d+ bytes in [\d\.]+ second /', "Output correct: ".$result->output );
  251. $cmd = "$command -u /statuscode/201 -e 200";
  252. $result = NPTest->testCmd( $cmd );
  253. is( $result->return_code, 2, $cmd);
  254. like( $result->output, '/^HTTP CRITICAL - Invalid HTTP response received from host on port \d+: HTTP/1.1 201 Created/', "Output correct: ".$result->output );
  255. $cmd = "$command -u /statuscode/200 -e 200,201,202";
  256. $result = NPTest->testCmd( $cmd );
  257. is( $result->return_code, 0, $cmd);
  258. like( $result->output, '/^HTTP OK: Status line output matched "200,201,202" - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  259. $cmd = "$command -u /statuscode/201 -e 200,201,202";
  260. $result = NPTest->testCmd( $cmd );
  261. is( $result->return_code, 0, $cmd);
  262. like( $result->output, '/^HTTP OK: Status line output matched "200,201,202" - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  263. $cmd = "$command -u /statuscode/203 -e 200,201,202";
  264. $result = NPTest->testCmd( $cmd );
  265. is( $result->return_code, 2, $cmd);
  266. like( $result->output, '/^HTTP CRITICAL - Invalid HTTP response received from host on port (\d+): HTTP/1.1 203 Non-Authoritative Information/', "Output correct: ".$result->output );
  267. $cmd = "$command -j HEAD -u /method";
  268. $result = NPTest->testCmd( $cmd );
  269. is( $result->return_code, 0, $cmd);
  270. like( $result->output, '/^HTTP OK: HTTP/1.1 200 HEAD - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  271. $cmd = "$command -j POST -u /method";
  272. $result = NPTest->testCmd( $cmd );
  273. is( $result->return_code, 0, $cmd);
  274. like( $result->output, '/^HTTP OK: HTTP/1.1 200 POST - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  275. $cmd = "$command -j GET -u /method";
  276. $result = NPTest->testCmd( $cmd );
  277. is( $result->return_code, 0, $cmd);
  278. like( $result->output, '/^HTTP OK: HTTP/1.1 200 GET - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  279. $cmd = "$command -u /method";
  280. $result = NPTest->testCmd( $cmd );
  281. is( $result->return_code, 0, $cmd);
  282. like( $result->output, '/^HTTP OK: HTTP/1.1 200 GET - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  283. $cmd = "$command -P foo -u /method";
  284. $result = NPTest->testCmd( $cmd );
  285. is( $result->return_code, 0, $cmd);
  286. like( $result->output, '/^HTTP OK: HTTP/1.1 200 POST - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  287. $cmd = "$command -j DELETE -u /method";
  288. $result = NPTest->testCmd( $cmd );
  289. is( $result->return_code, 1, $cmd);
  290. like( $result->output, '/^HTTP WARNING: HTTP/1.1 405 Method Not Allowed/', "Output correct: ".$result->output );
  291. $cmd = "$command -j foo -u /method";
  292. $result = NPTest->testCmd( $cmd );
  293. is( $result->return_code, 2, $cmd);
  294. like( $result->output, '/^HTTP CRITICAL: HTTP/1.1 501 Not Implemented/', "Output correct: ".$result->output );
  295. $cmd = "$command -P stufftoinclude -u /postdata -s POST:stufftoinclude";
  296. $result = NPTest->testCmd( $cmd );
  297. is( $result->return_code, 0, $cmd);
  298. like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  299. $cmd = "$command -j PUT -P stufftoinclude -u /postdata -s PUT:stufftoinclude";
  300. $result = NPTest->testCmd( $cmd );
  301. is( $result->return_code, 0, $cmd);
  302. like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  303. # To confirm that the free doesn't segfault
  304. $cmd = "$command -P stufftoinclude -j PUT -u /postdata -s PUT:stufftoinclude";
  305. $result = NPTest->testCmd( $cmd );
  306. is( $result->return_code, 0, $cmd);
  307. like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  308. $cmd = "$command -u /redirect";
  309. $result = NPTest->testCmd( $cmd );
  310. is( $result->return_code, 0, $cmd);
  311. like( $result->output, '/^HTTP OK: HTTP/1.1 301 Moved Permanently - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  312. $cmd = "$command -f follow -u /redirect";
  313. $result = NPTest->testCmd( $cmd );
  314. is( $result->return_code, 0, $cmd);
  315. like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  316. $cmd = "$command -u /redirect -k 'follow: me'";
  317. $result = NPTest->testCmd( $cmd );
  318. is( $result->return_code, 0, $cmd);
  319. like( $result->output, '/^HTTP OK: HTTP/1.1 301 Moved Permanently - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  320. $cmd = "$command -f follow -u /redirect -k 'follow: me'";
  321. $result = NPTest->testCmd( $cmd );
  322. is( $result->return_code, 0, $cmd);
  323. like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  324. $cmd = "$command -f sticky -u /redirect -k 'follow: me'";
  325. $result = NPTest->testCmd( $cmd );
  326. is( $result->return_code, 0, $cmd);
  327. like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  328. $cmd = "$command -f stickyport -u /redirect -k 'follow: me'";
  329. $result = NPTest->testCmd( $cmd );
  330. is( $result->return_code, 0, $cmd);
  331. like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  332. $cmd = "$command -u /chunked -s foobarbaz";
  333. $result = NPTest->testCmd( $cmd );
  334. is( $result->return_code, 0, $cmd);
  335. like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
  336. # These tests may block
  337. print "ALRM\n";
  338. # stickyport - on full urlS port is set back to 80 otherwise
  339. $cmd = "$command -f stickyport -u /redir_external -t 5 -s redirected";
  340. eval {
  341. local $SIG{ALRM} = sub { die "alarm\n" };
  342. alarm(2);
  343. $result = NPTest->testCmd( $cmd );
  344. alarm(0); };
  345. isnt( $@, "alarm\n", $cmd );
  346. is( $result->return_code, 0, $cmd );
  347. # Let's hope there won't be any web server on :80 returning "redirected"!
  348. $cmd = "$command -f sticky -u /redir_external -t 5 -s redirected";
  349. eval {
  350. local $SIG{ALRM} = sub { die "alarm\n" };
  351. alarm(2);
  352. $result = NPTest->testCmd( $cmd );
  353. alarm(0); };
  354. isnt( $@, "alarm\n", $cmd );
  355. isnt( $result->return_code, 0, $cmd );
  356. # Test an external address - timeout
  357. SKIP: {
  358. skip "This doesn't seems to work all the time", 1 unless ($ENV{HTTP_EXTERNAL});
  359. $cmd = "$command -f follow -u /redir_external -t 5";
  360. eval {
  361. local $SIG{ALRM} = sub { die "alarm\n" };
  362. alarm(2);
  363. $result = NPTest->testCmd( $cmd );
  364. alarm(0); };
  365. is( $@, "alarm\n", $cmd );
  366. }
  367. $cmd = "$command -u /timeout -t 5";
  368. eval {
  369. local $SIG{ALRM} = sub { die "alarm\n" };
  370. alarm(2);
  371. $result = NPTest->testCmd( $cmd );
  372. alarm(0); };
  373. is( $@, "alarm\n", $cmd );
  374. $cmd = "$command -f follow -u /redir_timeout -t 2";
  375. eval {
  376. local $SIG{ALRM} = sub { die "alarm\n" };
  377. alarm(5);
  378. $result = NPTest->testCmd( $cmd );
  379. alarm(0); };
  380. isnt( $@, "alarm\n", $cmd );
  381. }