summaryrefslogtreecommitdiffstats
path: root/plugins/check_curl.c
AgeCommit message (Collapse)AuthorFilesLines
2024-08-16check_curl: Documentation for --certificate, --cookie-jarrefs/pull/2012/headAlvar Penning1-3/+6
From the mere help output for -C / --certificate, I was confused about what its two integer parameters do. Unfortunately, I also missed out on the explaining examples later. Since I like to have basic documentation for each flag, I tried to make the arguments as short as possible. The other fix was one hyphen too many for the --cookie-jar option.
2024-08-11check_curl: raise SSL issue when --continue-after-certificate is usedYannick Martin1-8/+9
This change aims to raise the worst status between the SSL check and the HTTP check. before: check_curl -H www.google.fr -S --continue-after-certificate --certificate 4000,4000 ; echo $? CRITICAL - Certificate '*.google.fr' expires in 74 day(s) (Tue 22 Oct 2024 12:53:52 PM GMT +0000). HTTP OK: HTTP/2 200 - 22807 bytes in 0.076 second response time |time=0.075516s;;;0.000000;10.000000 size=22807B;;;0; 0 after: /usr/lib/nagios/ovh/check_curl -H www.google.fr -S --continue-after-certificate --certificate 4000,4000 ; echo $? CRITICAL - Certificate '*.google.fr' expires in 74 day(s) (Tue 22 Oct 2024 12:53:52 PM GMT +0000). HTTP OK: HTTP/2 200 - 22840 bytes in 0.090 second response time |time=0.090463s;;;0.000000;10.000000 size=22840B;;;0; 2
2024-07-30check_curl: fix relative redirects on non-standard portSven Nierlein1-5/+10
Having a webserver respond with a relative redirect as for ex. in `Location: /path/to.html` check_curl would use the wrong standard http/https port instead of crafting the absolute url using the given scheme/hostname and port. Adding a new test case for this for check_http and check_curl. check_http did it correct already, so no fix necessary there. before: %>./check_curl -H 127.0.0.1 -p 50493 -f follow -u /redirect_rel -s redirected -vvv **** HEADER **** HTTP/1.1 302 Found ... Location: /redirect2 ... * Seen redirect location /redirect2 ** scheme: (null) ** host: (null) ** port: (null) ** path: /redirect2 Redirection to http://127.0.0.1:80/redirect2 fixed: %>./check_curl -H 127.0.0.1 -p 50493 -f follow -u /redirect_rel -s redirected -vvv **** HEADER **** HTTP/1.1 302 Found ... Location: /redirect2 ... * Seen redirect location /redirect2 ** scheme: (null) ** host: (null) ** port: (null) ** path: /redirect2 Redirection to http://127.0.0.1:50493/redirect2 Signed-off-by: Sven Nierlein <sven@nierlein.de>
2024-04-07check_http/check_curl: added a --regex-state option to change the state of a ↵Andreas Baumann1-3/+16
regex check from the default CRITICAL to something else (#1213)
2024-04-07check_curl/check_http: clarified format of POST data (#1978)Andreas Baumann1-1/+1
2024-02-01check_curl: add haproxy protocol optionrefs/pull/1985/headEmmanuel Riviere1-2/+15
2023-11-22Merge pull request #1951 from RincewindsHat/compiler_warnings_maybe_unusedLorenz Kästle1-1/+1
Fix compiler warning for uninitialized variable
2023-10-19Fixes for -Wsign-compareRincewindsHat1-7/+6
2023-10-19check_curl: Initialize pointer before usageRincewindsHat1-1/+1
2023-10-15fix compiler warnings for unused variablesrefs/pull/1938/headRincewindsHat1-2/+12
2023-10-15Whitespace fixesrefs/pull/1936/headRincewindsHat1-4/+4
2023-10-15Fix -Wcast-function-type compiler warningsRincewindsHat1-6/+4
2023-06-28Merge branch 'master' into compiler_warning_part_2refs/pull/1867/headwaja1-3/+2
2023-04-26Avoid unnecessary malloc and use stack insteadLorenz Kästle1-6/+1
2023-04-17Fixes for -WrestrictRincewindsHat1-67/+184
2023-04-17Fixes for -Wunused-parametersRincewindsHat1-3/+6
2023-04-17Fixes for -Wimplicit-fallthroughRincewindsHat1-0/+1
2023-04-17Fixes for -Wunusedrefs/pull/1866/headRincewindsHat1-3/+2
* lib/utils_base.c * plugins/check_curl.c * plugins-root/check_dhcp.c Removed a line which theoretically can not do anything, but there was comment which indicated something else. Still trying this though.
2023-04-14Fix a lot of typos reported by codespellrefs/pull/1864/headJan Wagner1-3/+3
2023-03-16check_curk: including netinet/in.h (for FreeBSD), fixed an ambigous compare ↵refs/pull/1855/headAndreas Baumann1-1/+2
warning
2023-03-11check_curl: removed a superflous variablerefs/pull/1847/headAndreas Baumann1-1/+0
2023-03-08fixed a wrong compare and a wrong size in strncatrefs/pull/1846/headAndreas Baumann1-2/+2
2023-03-08check_curl.c: Include all IPs from getaddrinfo() in curl DNS cacheBarak Shohat1-13/+26
2023-03-07check_curl: in SSL host caching mode try to connect and bind and take the ↵Andreas Baumann1-7/+15
first getaddrinfo result which succeeds
2023-02-17using real boolean in check_curlrefs/pull/1843/headAndreas Baumann1-78/+82
2023-02-12changed #else/#if to #elif in libcurl library checksAndreas Baumann1-4/+2
2023-02-12fixed double frees when doing old-style redirectsAndreas Baumann1-4/+14
2023-02-12better cleanup of curl structures and buffersAndreas Baumann1-11/+20
2023-02-11added --cookie-jar and doing proper cleanup of libcurlAndreas Baumann1-13/+34
2023-02-11fixed regerror is MAX_INPUT_BUFFER writting into too small errbufAndreas Baumann1-1/+1
2023-02-05using CURLOPT_REDIR_PROTOCOLS_STR instead of CURLOPT_REDIR_PROTOCOLS for ↵Andreas Baumann1-0/+4
curl >= 7.85.0
2023-01-17Fixing spelling errors (#1826)waja1-1/+1
2022-12-22check_curl: fix checking large bodys (#1823)Sven Nierlein1-2/+5
check_curl fails on large pages: HTTP CRITICAL - Invalid HTTP response received from host on port 5080: cURL returned 23 - Failure writing output to destination for example trying to run check_curl on the test from #1822 I guess the idea is to double the buffer size each time it is to small. But the code exponentially grows the buffer size which works well 2-3 times, but then fails.
2022-11-07Check curl detect ipv6 (#1809)Lorenz1-4/+18
* If server_address is an IPv6 address surround it with brackets * If the message is too short, we should not have an underflow * Add simple conditional test case available if IPv6 is
2022-04-10check_curl: added option --continue-after-certificate (#1761)refs/pull/1762/headAndreas Baumann1-4/+22
2022-01-29fixed -ffollow for HTTP/2.0 (Fixes #1685): added major_version parsing to ↵Andreas Baumann1-3/+3
PicoHTTPParser
2022-01-29check_http and check_curl: added --max-redirs=N option (feature #1684)Andreas Baumann1-2/+14
2021-11-17Merge pull request #1688 from bazzisoft/masterRincewindsHat1-1/+1
check_curl.c: bugfix: verify certificates option should not force SSL to be used
2021-07-25check_curl: fixed a potential buffer overflow in retir/uri_stringAndreas Baumann1-2/+2
2021-07-25check_curl: fixed DNS caching for SSL hostnames (avoid CURLOPT_RESOLVE entry ↵Andreas Baumann1-3/+51
errors)
2021-07-04check_curl: changed to STATE_CRITICAL for infinite loops (-ffollow)Andreas Baumann1-2/+2
2021-06-24fix for missing X509_up_ref on old systems with only OpenSSL 1.0Andreas Baumann1-0/+6
2021-06-24added option --enable-automatic-decompressionAndreas Baumann1-1/+16
2021-05-27check_curl:refs/pull/1689/headAndreas Baumann1-0/+12
- added verbose output in verify_callback - pin refcounting for certs (avoid subject extraction error when checking certs in is_openssl_callback mode)
2021-05-24check_curl.c: bugfix: verify certificates option should not force SSL to be usedrefs/pull/1688/headBarak Shohat1-1/+1
2021-04-13check_curl: Fix bug where headers beginning with HTTP_ cause the status line ↵Barak Shohat1-1/+1
parsing to fail.
2021-04-08check_curl: backported --show-body/-B to print body (from check_http)refs/pull/1671/headAndreas Baumann1-4/+15
2021-04-08check_curl: make -C obvious (from check_http, part 2)Andreas Baumann1-0/+4
2021-04-08check_curl: make -C obvious (from check_http)Andreas Baumann1-1/+3
2021-04-08check_curl: Increase regexp limit (to 1024 as in check_http)Andreas Baumann1-1/+1