check_by_ssh.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484
  1. /*****************************************************************************
  2. *
  3. * Nagios check_by_ssh plugin
  4. *
  5. * License: GPL
  6. * Copyright (c) 2000-2014 Nagios Plugins Development Team
  7. *
  8. * Description:
  9. *
  10. * This file contains the check_by_ssh plugin
  11. *
  12. *
  13. * This program is free software: you can redistribute it and/or modify
  14. * it under the terms of the GNU General Public License as published by
  15. * the Free Software Foundation, either version 3 of the License, or
  16. * (at your option) any later version.
  17. *
  18. * This program is distributed in the hope that it will be useful,
  19. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  20. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  21. * GNU General Public License for more details.
  22. *
  23. * You should have received a copy of the GNU General Public License
  24. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  25. *
  26. *
  27. *****************************************************************************/
  28. const char *progname = "check_by_ssh";
  29. const char *copyright = "2000-";
  30. const char *email = "devel@nagios-plugins.org";
  31. #include "common.h"
  32. #include "utils.h"
  33. #include "netutils.h"
  34. #include "utils_cmd.h"
  35. #ifndef NP_MAXARGS
  36. #define NP_MAXARGS 1024
  37. #endif
  38. int process_arguments (int, char **);
  39. int validate_arguments (void);
  40. void comm_append (const char *);
  41. void print_help (void);
  42. void print_usage (void);
  43. unsigned int commands = 0;
  44. unsigned int services = 0;
  45. int skip_stdout = 0;
  46. int skip_stderr = 0;
  47. char *remotecmd = NULL;
  48. char **commargv = NULL;
  49. int commargc = 0;
  50. char *hostname = NULL;
  51. char *outputfile = NULL;
  52. char *host_shortname = NULL;
  53. char **service;
  54. int passive = FALSE;
  55. int verbose = FALSE;
  56. int
  57. main (int argc, char **argv)
  58. {
  59. char *status_text;
  60. int cresult;
  61. int result = STATE_UNKNOWN;
  62. int i;
  63. time_t local_time;
  64. FILE *fp = NULL;
  65. output chld_out, chld_err;
  66. remotecmd = "";
  67. comm_append(SSH_COMMAND);
  68. setlocale (LC_ALL, "");
  69. bindtextdomain (PACKAGE, LOCALEDIR);
  70. textdomain (PACKAGE);
  71. /* Parse extra opts if any */
  72. argv=np_extra_opts (&argc, argv, progname);
  73. /* process arguments */
  74. if (process_arguments (argc, argv) == ERROR)
  75. usage_va(_("Could not parse arguments"));
  76. /* Set signal handling and alarm timeout */
  77. if (signal (SIGALRM, timeout_alarm_handler) == SIG_ERR) {
  78. usage_va(_("Cannot catch SIGALRM"));
  79. }
  80. alarm (timeout_interval);
  81. /* run the command */
  82. if (verbose) {
  83. printf ("Command: %s\n", commargv[0]);
  84. for (i=1; i<commargc; i++)
  85. printf ("Argument %i: %s\n", i, commargv[i]);
  86. }
  87. result = cmd_run_array (commargv, &chld_out, &chld_err, 0);
  88. if (skip_stdout == -1) /* --skip-stdout specified without argument */
  89. skip_stdout = chld_out.lines;
  90. if (skip_stderr == -1) /* --skip-stderr specified without argument */
  91. skip_stderr = chld_err.lines;
  92. /* UNKNOWN or worse if (non-skipped) output found on stderr */
  93. if(chld_err.lines > skip_stderr) {
  94. result = max_state_alt(result, STATE_UNKNOWN);
  95. printf (_("%s - check_by_ssh: Remote command execution failed: %s\n"),
  96. state_text(result), chld_err.line[skip_stderr]);
  97. return result;
  98. }
  99. /* this is simple if we're not supposed to be passive.
  100. * Wrap up quickly and keep the tricks below */
  101. if(!passive) {
  102. /* UNKNOWN if result exceed nagios plugins conventions,
  103. * such as ssh or other remote execution error */
  104. int chld_return_code = result;
  105. result = min(result, STATE_UNKNOWN);
  106. if (chld_out.lines > skip_stdout)
  107. for (i = skip_stdout; i < chld_out.lines; i++)
  108. puts (chld_out.line[i]);
  109. else
  110. printf (_("%s - check_by_ssh: Remote command '%s' returned status %d\n"),
  111. state_text(result), remotecmd, chld_return_code);
  112. return result;
  113. }
  114. /*
  115. * Passive mode
  116. */
  117. /* process output */
  118. if (!(fp = fopen (outputfile, "a"))) {
  119. printf (_("SSH WARNING: could not open %s\n"), outputfile);
  120. exit (STATE_UNKNOWN);
  121. }
  122. local_time = time (NULL);
  123. commands = 0;
  124. for(i = skip_stdout; i < chld_out.lines; i++) {
  125. status_text = chld_out.line[i++];
  126. if (i == chld_out.lines || strstr (chld_out.line[i], "STATUS CODE: ") == NULL)
  127. die (STATE_UNKNOWN, _("%s: Error parsing output\n"), progname);
  128. if (service[commands] && status_text
  129. && sscanf (chld_out.line[i], "STATUS CODE: %d", &cresult) == 1)
  130. {
  131. fprintf (fp, "[%d] PROCESS_SERVICE_CHECK_RESULT;%s;%s;%d;%s\n",
  132. (int) local_time, host_shortname, service[commands++],
  133. cresult, status_text);
  134. }
  135. }
  136. /* Multiple commands and passive checking should always return OK */
  137. return result;
  138. }
  139. /* process command-line arguments */
  140. int
  141. process_arguments (int argc, char **argv)
  142. {
  143. int c;
  144. char *p1, *p2;
  145. int option = 0;
  146. static struct option longopts[] = {
  147. {"version", no_argument, 0, 'V'},
  148. {"help", no_argument, 0, 'h'},
  149. {"verbose", no_argument, 0, 'v'},
  150. {"fork", no_argument, 0, 'f'},
  151. {"timeout", required_argument, 0, 't'},
  152. {"host", required_argument, 0, 'H'}, /* backward compatibility */
  153. {"hostname", required_argument, 0, 'H'},
  154. {"port", required_argument,0,'p'},
  155. {"output", required_argument, 0, 'O'},
  156. {"name", required_argument, 0, 'n'},
  157. {"services", required_argument, 0, 's'},
  158. {"identity", required_argument, 0, 'i'},
  159. {"user", required_argument, 0, 'u'},
  160. {"unknown-timeout", no_argument, 0, 'U'},
  161. {"logname", required_argument, 0, 'l'},
  162. {"command", required_argument, 0, 'C'},
  163. {"skip", optional_argument, 0, 'S'}, /* backwards compatibility */
  164. {"skip-stdout", optional_argument, 0, 'S'},
  165. {"skip-stderr", optional_argument, 0, 'E'},
  166. {"proto1", no_argument, 0, '1'},
  167. {"proto2", no_argument, 0, '2'},
  168. {"use-ipv4", no_argument, 0, '4'},
  169. {"use-ipv6", no_argument, 0, '6'},
  170. {"ssh-option", required_argument, 0, 'o'},
  171. {"quiet", no_argument, 0, 'q'},
  172. {"configfile", optional_argument, 0, 'F'},
  173. {0, 0, 0, 0}
  174. };
  175. if (argc < 2)
  176. return ERROR;
  177. for (c = 1; c < argc; c++)
  178. if (strcmp ("-to", argv[c]) == 0)
  179. strcpy (argv[c], "-t");
  180. while (1) {
  181. c = getopt_long (argc, argv, "Vvh1246fUqt:H:O:p:i:u:l:C:S::E::n:s:o:F:", longopts,
  182. &option);
  183. if (c == -1 || c == EOF)
  184. break;
  185. switch (c) {
  186. case 'V': /* version */
  187. print_revision (progname, NP_VERSION);
  188. exit (STATE_OK);
  189. case 'h': /* help */
  190. print_help ();
  191. exit (STATE_OK);
  192. case 'v': /* help */
  193. verbose = TRUE;
  194. break;
  195. case 't': /* timeout period */
  196. timeout_interval = parse_timeout_string (optarg);
  197. break;
  198. case 'H': /* host */
  199. host_or_die(optarg);
  200. hostname = optarg;
  201. break;
  202. case 'p': /* port number */
  203. if (!is_integer (optarg))
  204. usage_va(_("Port must be a positive integer"));
  205. comm_append("-p");
  206. comm_append(optarg);
  207. break;
  208. case 'O': /* output file */
  209. outputfile = optarg;
  210. passive = TRUE;
  211. break;
  212. case 's': /* description of service to check */
  213. p1 = optarg;
  214. service = realloc (service, (++services) * sizeof(char *));
  215. while ((p2 = index (p1, ':'))) {
  216. *p2 = '\0';
  217. service[services - 1] = p1;
  218. service = realloc (service, (++services) * sizeof(char *));
  219. p1 = p2 + 1;
  220. }
  221. service[services - 1] = p1;
  222. break;
  223. case 'n': /* short name of host in nagios configuration */
  224. host_shortname = optarg;
  225. break;
  226. case 'u':
  227. comm_append("-l");
  228. comm_append(optarg);
  229. break;
  230. case 'l': /* login name */
  231. comm_append("-l");
  232. comm_append(optarg);
  233. break;
  234. case 'i': /* identity */
  235. comm_append("-i");
  236. comm_append(optarg);
  237. break;
  238. case '1': /* Pass these switches directly to ssh */
  239. comm_append("-1");
  240. break;
  241. case '2': /* 1 to force version 1, 2 to force version 2 */
  242. comm_append("-2");
  243. break;
  244. case '4': /* -4 for IPv4 */
  245. comm_append("-4");
  246. break;
  247. case '6': /* -6 for IPv6 */
  248. comm_append("-6");
  249. break;
  250. case 'f': /* fork to background */
  251. comm_append("-f");
  252. break;
  253. case 'C': /* Command for remote machine */
  254. commands++;
  255. if (commands > 1)
  256. xasprintf (&remotecmd, "%s;echo STATUS CODE: $?;", remotecmd);
  257. xasprintf (&remotecmd, "%s%s", remotecmd, optarg);
  258. break;
  259. case 'S': /* skip n (or all) lines on stdout */
  260. if (optarg == NULL)
  261. skip_stdout = -1; /* skip all output on stdout */
  262. else if (!is_integer (optarg))
  263. usage_va(_("skip-stdout argument must be an integer"));
  264. else
  265. skip_stdout = atoi (optarg);
  266. break;
  267. case 'E': /* skip n (or all) lines on stderr */
  268. if (optarg == NULL)
  269. skip_stderr = -1; /* skip all output on stderr */
  270. else if (!is_integer (optarg))
  271. usage_va(_("skip-stderr argument must be an integer"));
  272. else
  273. skip_stderr = atoi (optarg);
  274. break;
  275. case 'o': /* Extra options for the ssh command */
  276. /* Don't allow the user to run commands local to the nagios server, unless they decide otherwise at compile time. */
  277. #ifndef HAVE_UNRESTRICTED_SSH_OPTIONS
  278. if ( strcasestr(optarg, "ProxyCommand") != NULL
  279. || strcasestr(optarg, "PermitLocalCommand") != NULL
  280. || strcasestr(optarg, "LocalCommand") != NULL) {
  281. break;
  282. }
  283. #endif
  284. comm_append("-o");
  285. comm_append(optarg);
  286. break;
  287. case 'q': /* Tell the ssh command to be quiet */
  288. comm_append("-q");
  289. break;
  290. case 'F': /* ssh configfile */
  291. comm_append("-F");
  292. comm_append(optarg);
  293. break;
  294. case 'U': /* return UNKNOWN on timeout */
  295. timeout_state=STATE_UNKNOWN;
  296. break;
  297. default: /* help */
  298. usage5();
  299. }
  300. }
  301. c = optind;
  302. if (hostname == NULL) {
  303. if (c <= argc) {
  304. die (STATE_UNKNOWN, _("%s: You must provide a host name\n"), progname);
  305. }
  306. host_or_die(argv[c]);
  307. hostname = argv[c++];
  308. }
  309. if (strlen(remotecmd) == 0) {
  310. for (; c < argc; c++)
  311. if (strlen(remotecmd) > 0)
  312. xasprintf (&remotecmd, "%s %s", remotecmd, argv[c]);
  313. else
  314. xasprintf (&remotecmd, "%s", argv[c]);
  315. }
  316. if (commands > 1 || passive)
  317. xasprintf (&remotecmd, "%s;echo STATUS CODE: $?;", remotecmd);
  318. if (remotecmd == NULL || strlen (remotecmd) <= 1)
  319. usage_va(_("No remotecmd"));
  320. comm_append(hostname);
  321. comm_append(remotecmd);
  322. return validate_arguments ();
  323. }
  324. void
  325. comm_append (const char *str)
  326. {
  327. if (++commargc > NP_MAXARGS)
  328. die(STATE_UNKNOWN, _("%s: Argument limit of %d exceeded\n"), progname, NP_MAXARGS);
  329. if ((commargv = (char **)realloc(commargv, (commargc+1) * sizeof(char *))) == NULL)
  330. die(STATE_UNKNOWN, _("Can not (re)allocate 'commargv' buffer\n"));
  331. commargv[commargc-1] = strdup(str);
  332. commargv[commargc] = NULL;
  333. }
  334. int
  335. validate_arguments (void)
  336. {
  337. if (remotecmd == NULL || hostname == NULL)
  338. return ERROR;
  339. if (passive && commands != services)
  340. die (STATE_UNKNOWN, _("%s: In passive mode, you must provide a service name for each command.\n"), progname);
  341. if (passive && host_shortname == NULL)
  342. die (STATE_UNKNOWN, _("%s: In passive mode, you must provide the host short name from the nagios configs.\n"), progname);
  343. return OK;
  344. }
  345. void
  346. print_help (void)
  347. {
  348. print_revision (progname, NP_VERSION);
  349. printf ("Copyright (c) 1999 Karl DeBisschop <kdebisschop@users.sourceforge.net>\n");
  350. printf (COPYRIGHT, copyright, email);
  351. printf (_("This plugin uses SSH to execute commands on a remote host"));
  352. printf ("\n\n");
  353. print_usage ();
  354. printf (UT_HELP_VRSN);
  355. printf (UT_EXTRA_OPTS);
  356. printf (UT_HOST_PORT, 'p', "none");
  357. printf (UT_IPv46);
  358. printf (" %s\n", "-1, --proto1");
  359. printf (" %s\n", _("tell ssh to use Protocol 1 [optional]"));
  360. printf (" %s\n", "-2, --proto2");
  361. printf (" %s\n", _("tell ssh to use Protocol 2 [optional]"));
  362. printf (" %s\n", "-S, --skip-stdout[=n]");
  363. printf (" %s\n", _("Ignore all or (if specified) first n lines on STDOUT [optional]"));
  364. printf (" %s\n", "-E, --skip-stderr[=n]");
  365. printf (" %s\n", _("Ignore all or (if specified) first n lines on STDERR [optional]"));
  366. printf (" %s\n", "-f");
  367. printf (" %s\n", _("tells ssh to fork rather than create a tty [optional]. This will always return OK if ssh is executed"));
  368. printf (" %s\n","-C, --command='COMMAND STRING'");
  369. printf (" %s\n", _("command to execute on the remote machine"));
  370. printf (" %s\n","-l, --logname=USERNAME");
  371. printf (" %s\n", _("SSH user name on remote host [optional]"));
  372. printf (" %s\n","-i, --identity=KEYFILE");
  373. printf (" %s\n", _("identity of an authorized key [optional]"));
  374. printf (" %s\n","-O, --output=FILE");
  375. printf (" %s\n", _("external command file for nagios [optional]"));
  376. printf (" %s\n","-s, --services=LIST");
  377. printf (" %s\n", _("list of nagios service names, separated by ':' [optional]"));
  378. printf (" %s\n","-n, --name=NAME");
  379. printf (" %s\n", _("short name of host in nagios configuration [optional]"));
  380. printf (" %s\n","-o, --ssh-option=OPTION");
  381. printf (" %s\n", _("Call ssh with '-o OPTION' (may be used multiple times) [optional]"));
  382. printf (" %s\n","-F, --configfile");
  383. printf (" %s\n", _("Tell ssh to use this configfile [optional]"));
  384. printf (" %s\n","-q, --quiet");
  385. printf (" %s\n", _("Tell ssh to suppress warning and diagnostic messages [optional]"));
  386. printf (" %s\n", "-U, --unknown-timeout");
  387. printf (" %s\n", _("Return UNKNOWN on timeouts"));
  388. printf (UT_CONN_TIMEOUT, DEFAULT_SOCKET_TIMEOUT);
  389. printf (UT_VERBOSE);
  390. printf("\n");
  391. printf (" %s\n", _("The most common mode of use is to refer to a local identity file with"));
  392. printf (" %s\n", _("the '-i' option. In this mode, the identity pair should have a null"));
  393. printf (" %s\n", _("passphrase and the public key should be listed in the authorized_keys"));
  394. printf (" %s\n", _("file of the remote host. Usually the key will be restricted to running"));
  395. printf (" %s\n", _("only one command on the remote server. If the remote SSH server tracks"));
  396. printf (" %s\n", _("invocation arguments, the one remote program may be an agent that can"));
  397. printf (" %s\n", _("execute additional commands as proxy"));
  398. printf("\n");
  399. printf (" %s\n", _("To use passive mode, provide multiple '-C' options, and provide"));
  400. printf (" %s\n", _("all of -O, -s, and -n options (servicelist order must match '-C'options)"));
  401. printf ("\n");
  402. printf ("%s\n", _("Examples:"));
  403. printf (" %s\n", "$ check_by_ssh -H localhost -n lh -s c1:c2:c3 -C uptime -C uptime -C uptime -O /tmp/foo");
  404. printf (" %s\n", "$ cat /tmp/foo");
  405. printf (" %s\n", "[1080933700] PROCESS_SERVICE_CHECK_RESULT;flint;c1;0; up 2 days");
  406. printf (" %s\n", "[1080933700] PROCESS_SERVICE_CHECK_RESULT;flint;c2;0; up 2 days");
  407. printf (" %s\n", "[1080933700] PROCESS_SERVICE_CHECK_RESULT;flint;c3;0; up 2 days");
  408. printf(UT_SUPPORT);
  409. }
  410. void
  411. print_usage (void)
  412. {
  413. printf ("%s\n", _("Usage:"));
  414. printf (" %s -H <host> -C <command> [-fqv] [-1|-2] [-4|-6]\n"
  415. " [-S [lines]] [-E [lines]] [-t timeout] [-i identity]\n"
  416. " [-l user] [-n name] [-s servicelist] [-O outputfile]\n"
  417. " [-p port] [-o ssh-option] [-F configfile]\n",
  418. progname);
  419. }