Module: monitoring-plugins
 Branch: feature_check_curl
 Commit: 5e39273cceaf1a0b3da46bdfef16ecba83258493
 Author: Andreas Baumann <m...@andreasbaumann.cc>
   Date: Fri Apr 14 20:04:51 2017 +0200
    URL: 
https://www.monitoring-plugins.org/repositories/monitoring-plugins/commit/?id=5e39273

made check_curl tests copies of check_http tests because they will differ 
slightly

---

 plugins/t/check_curl.t     | 205 +++++++++++++++++++++-
 plugins/tests/check_curl.t | 419 ++++++++++++++++++++++++++++++++++++++++++++-
 2 files changed, 622 insertions(+), 2 deletions(-)

diff --git a/plugins/t/check_curl.t b/plugins/t/check_curl.t
deleted file mode 120000
index a54db96..0000000
--- a/plugins/t/check_curl.t
+++ /dev/null
@@ -1 +0,0 @@
-check_http.t
\ No newline at end of file
diff --git a/plugins/t/check_curl.t b/plugins/t/check_curl.t
new file mode 100644
index 0000000..e67fafb
--- /dev/null
+++ b/plugins/t/check_curl.t
@@ -0,0 +1,204 @@
+#! /usr/bin/perl -w -I ..
+#
+# HyperText Transfer Protocol (HTTP) Test via check_http
+#
+#
+
+use strict;
+use Test::More;
+use POSIX qw/mktime strftime/;
+use NPTest;
+
+plan tests => 49;
+
+my $successOutput = '/OK.*HTTP.*second/';
+
+my $res;
+my $plugin = 'check_http';
+$plugin    = 'check_curl' if $0 =~ m/check_curl/mx;
+
+my $host_tcp_http      = getTestParameter( "NP_HOST_TCP_HTTP",
+               "A host providing the HTTP Service (a web server)",
+               "localhost" );
+
+my $host_tls_http      = getTestParameter( "host_tls_http",      
"NP_HOST_TLS_HTTP",      "localhost",
+                                          "A host providing the HTTPS Service 
(a tls web server)" );
+
+my $host_tls_cert      = getTestParameter( "host_tls_cert",      
"NP_HOST_TLS_CERT",      "localhost",
+                                          "the common name of the 
certificate." );
+
+
+my $host_nonresponsive = getTestParameter( "NP_HOST_NONRESPONSIVE",
+               "The hostname of system not responsive to network requests",
+               "10.0.0.1" );
+
+my $hostname_invalid   = getTestParameter( "NP_HOSTNAME_INVALID",
+               "An invalid (not known to DNS) hostname",
+               "nosuchhost");
+
+my $internet_access = getTestParameter( "NP_INTERNET_ACCESS",
+                "Is this system directly connected to the internet?",
+                "yes");
+
+my $host_tcp_http2  = getTestParameter( "NP_HOST_TCP_HTTP2",
+            "A host providing an index page containing the string 
'monitoring'",
+            "test.monitoring-plugins.org" );
+
+my $faketime = -x '/usr/bin/faketime' ? 1 : 0;
+
+
+$res = NPTest->testCmd(
+       "./$plugin $host_tcp_http -wt 300 -ct 600"
+       );
+cmp_ok( $res->return_code, '==', 0, "Webserver $host_tcp_http responded" );
+like( $res->output, $successOutput, "Output OK" );
+
+$res = NPTest->testCmd(
+       "./$plugin $host_tcp_http -wt 300 -ct 600 -v -v -v -k 'bob:there' -k 
'carl:frown'"
+       );
+like( $res->output, '/bob:there\r\ncarl:frown\r\n/', "Got headers with 
multiple -k options" );
+
+$res = NPTest->testCmd(
+       "./$plugin $host_nonresponsive -wt 1 -ct 2 -t 3"
+       );
+cmp_ok( $res->return_code, '==', 2, "Webserver $host_nonresponsive not 
responding" );
+# was CRITICAL only, but both check_curl and check_http print HTTP CRITICAL 
(puzzle?!)
+cmp_ok( $res->output, 'eq', "HTTP CRITICAL - Invalid HTTP response received 
from host on port 80: cURL returned 28 - Timeout was reached", "Output OK");
+
+$res = NPTest->testCmd(
+       "./$plugin $hostname_invalid -wt 1 -ct 2"
+       );
+cmp_ok( $res->return_code, '==', 2, "Webserver $hostname_invalid not valid" );
+# The first part of the message comes from the OS catalogue, so cannot check 
this.
+# On Debian, it is Name or service not known, on Darwin, it is No address 
associated with nodename
+# Is also possible to get a socket timeout if DNS is not responding fast enough
+# cURL gives us consistent strings from it's own 'lib/strerror.c'
+like( $res->output, "/cURL returned 6 - Couldn't resolve host name/", "Output 
OK");
+
+# host header checks
+$res = NPTest->testCmd("./$plugin -v -H $host_tcp_http");
+like( $res->output, '/^Host: '.$host_tcp_http.'\s*$/ms', "Host Header OK" );
+
+$res = NPTest->testCmd("./$plugin -v -H $host_tcp_http -p 80");
+like( $res->output, '/^Host: '.$host_tcp_http.'\s*$/ms', "Host Header OK" );
+
+$res = NPTest->testCmd("./$plugin -v -H $host_tcp_http:8080 -p 80");
+like( $res->output, '/^Host: '.$host_tcp_http.':8080\s*$/ms', "Host Header OK" 
);
+
+$res = NPTest->testCmd("./$plugin -v -H $host_tcp_http:8080 -p 80");
+like( $res->output, '/^Host: '.$host_tcp_http.':8080\s*$/ms', "Host Header OK" 
);
+
+SKIP: {
+        skip "No internet access", 3 if $internet_access eq "no";
+
+        $res = NPTest->testCmd("./$plugin -v -H $host_tls_http -S");
+        like( $res->output, '/^Host: '.$host_tls_http.'\s*$/ms', "Host Header 
OK" );
+
+        $res = NPTest->testCmd("./$plugin -v -H $host_tls_http:8080 -S -p 
443");
+        like( $res->output, '/^Host: '.$host_tls_http.':8080\s*$/ms', "Host 
Header OK" );
+
+        $res = NPTest->testCmd("./$plugin -v -H $host_tls_http:443 -S -p 443");
+        like( $res->output, '/^Host: '.$host_tls_http.'\s*$/ms', "Host Header 
OK" );
+};
+
+SKIP: {
+        skip "No host serving monitoring in index file", 7 unless 
$host_tcp_http2;
+
+        $res = NPTest->testCmd( "./$plugin -H $host_tcp_http2 -r 'monitoring'" 
);
+        cmp_ok( $res->return_code, "==", 0, "Got a reference to 'monitoring'");
+
+        $res = NPTest->testCmd( "./$plugin -H $host_tcp_http2 -r 'mONiTORing'" 
);
+        cmp_ok( $res->return_code, "==", 2, "Not got 'mONiTORing'");
+        like ( $res->output, "/pattern not found/", "Error message says 
'pattern not found'");
+
+        $res = NPTest->testCmd( "./$plugin -H $host_tcp_http2 -R 'mONiTORing'" 
);
+        cmp_ok( $res->return_code, "==", 0, "But case insensitive doesn't mind 
'mONiTORing'");
+
+        $res = NPTest->testCmd( "./$plugin -H $host_tcp_http2 -r 'monitoring' 
--invert-regex" );
+        cmp_ok( $res->return_code, "==", 2, "Invert results work when found");
+        like ( $res->output, "/pattern found/", "Error message says 'pattern 
found'");
+
+        $res = NPTest->testCmd( "./$plugin -H $host_tcp_http2 -r 'mONiTORing' 
--invert-regex" );
+        cmp_ok( $res->return_code, "==", 0, "And also when not found");
+}
+SKIP: {
+        skip "No internet access", 16 if $internet_access eq "no";
+
+        $res = NPTest->testCmd(
+                "./$plugin --ssl $host_tls_http"
+                );
+        cmp_ok( $res->return_code, '==', 0, "Can read https for 
$host_tls_http" );
+
+        $res = NPTest->testCmd( "./$plugin -C 1 --ssl $host_tls_http" );
+        cmp_ok( $res->return_code, '==', 0, "Checking certificate for 
$host_tls_http");
+        like  ( $res->output, "/Certificate '$host_tls_cert' will expire on/", 
"Output OK" );
+        my $saved_cert_output = $res->output;
+
+        $res = NPTest->testCmd( "./$plugin -C 8000,1 --ssl $host_tls_http" );
+        cmp_ok( $res->return_code, '==', 1, "Checking certificate for 
$host_tls_http");
+        like  ( $res->output, qr/WARNING - Certificate '$host_tls_cert' 
expires in \d+ day/, "Output Warning" );
+
+        $res = NPTest->testCmd( "./$plugin $host_tls_http -C 1" );
+        is( $res->return_code, 0, "Old syntax for cert checking okay" );
+        is( $res->output, $saved_cert_output, "Same output as new syntax" );
+
+        $res = NPTest->testCmd( "./$plugin -H $host_tls_http -C 1" );
+        is( $res->return_code, 0, "Updated syntax for cert checking okay" );
+        is( $res->output, $saved_cert_output, "Same output as new syntax" );
+
+        $res = NPTest->testCmd( "./$plugin -C 1 $host_tls_http" );
+        cmp_ok( $res->output, 'eq', $saved_cert_output, "--ssl option 
automatically added");
+
+        $res = NPTest->testCmd( "./$plugin $host_tls_http -C 1" );
+        cmp_ok( $res->output, 'eq', $saved_cert_output, "Old syntax for cert 
checking still works");
+
+        # run some certificate checks with faketime
+        SKIP: {
+                skip "No faketime binary found", 12 if !$faketime;
+                $res = NPTest->testCmd("LC_TIME=C TZ=UTC ./$plugin -C 1 
$host_tls_http");
+                like($res->output, qr/OK - Certificate '$host_tls_cert' will 
expire on/, "Catch cert output");
+                is( $res->return_code, 0, "Catch cert output exit code" );
+                my($mon,$day,$hour,$min,$sec,$year) = ($res->output =~ 
/(\w+)\s+(\d+)\s+(\d+):(\d+):(\d+)\s+(\d+)/);
+                if(!defined $year) {
+                    die("parsing date failed from: ".$res->output);
+                }
+                my $months = {'Jan' => 0, 'Feb' => 1, 'Mar' => 2, 'Apr' => 3, 
'May' => 4, 'Jun' => 5, 'Jul' => 6, 'Aug' => 7, 'Sep' => 8, 'Oct' => 9, 'Nov' 
=> 10, 'Dec' => 11};
+                my $ts   = mktime($sec, $min, $hour, $day, $months->{$mon}, 
$year-1900);
+                my $time = strftime("%Y-%m-%d %H:%M:%S", localtime($ts));
+                $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f 
'".strftime("%Y-%m-%d %H:%M:%S", localtime($ts))."' ./$plugin -C 1 
$host_tls_http");
+                like($res->output, qr/CRITICAL - Certificate '$host_tls_cert' 
just expired/, "Output on expire date");
+                is( $res->return_code, 2, "Output on expire date" );
+
+                $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f 
'".strftime("%Y-%m-%d %H:%M:%S", localtime($ts-1))."' ./$plugin -C 1 
$host_tls_http");
+                like($res->output, qr/CRITICAL - Certificate '$host_tls_cert' 
expires in 0 minutes/, "cert expires in 1 second output");
+                is( $res->return_code, 2, "cert expires in 1 second exit code" 
);
+
+                $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f 
'".strftime("%Y-%m-%d %H:%M:%S", localtime($ts-120))."' ./$plugin -C 1 
$host_tls_http");
+                like($res->output, qr/CRITICAL - Certificate '$host_tls_cert' 
expires in 2 minutes/, "cert expires in 2 minutes output");
+                is( $res->return_code, 2, "cert expires in 2 minutes exit 
code" );
+
+                $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f 
'".strftime("%Y-%m-%d %H:%M:%S", localtime($ts-7200))."' ./$plugin -C 1 
$host_tls_http");
+                like($res->output, qr/CRITICAL - Certificate '$host_tls_cert' 
expires in 2 hours/, "cert expires in 2 hours output");
+                is( $res->return_code, 2, "cert expires in 2 hours exit code" 
);
+
+                $res = NPTest->testCmd("LC_TIME=C TZ=UTC faketime -f 
'".strftime("%Y-%m-%d %H:%M:%S", localtime($ts+1))."' ./$plugin -C 1 
$host_tls_http");
+                like($res->output, qr/CRITICAL - Certificate '$host_tls_cert' 
expired on/, "Certificate expired output");
+                is( $res->return_code, 2, "Certificate expired exit code" );
+        };
+
+        $res = NPTest->testCmd( "./$plugin --ssl $host_tls_http -E" );
+        like  ( $res->output, '/time_connect=[\d\.]+/', 'Extended Performance 
Data Output OK' );
+        like  ( $res->output, '/time_ssl=[\d\.]+/', 'Extended Performance Data 
SSL Output OK' );
+
+        $res = NPTest->testCmd(
+                "./$plugin --ssl -H www.e-paycobalt.com"
+                );
+        cmp_ok( $res->return_code, "==", 0, "Can read https for 
www.e-paycobalt.com (uses AES certificate)" );
+
+
+        $res = NPTest->testCmd( "./$plugin -H www.mozilla.com -u /firefox -f 
follow" );
+        is( $res->return_code, 0, "Redirection based on location is okay");
+
+        $res = NPTest->testCmd( "./$plugin -H www.mozilla.com 
--extended-perfdata" );
+        like  ( $res->output, '/time_connect=[\d\.]+/', 'Extended Performance 
Data Output OK' );
+}
diff --git a/plugins/tests/check_curl.t b/plugins/tests/check_curl.t
deleted file mode 120000
index a54db96..0000000
--- a/plugins/tests/check_curl.t
+++ /dev/null
@@ -1 +0,0 @@
-check_http.t
\ No newline at end of file
diff --git a/plugins/tests/check_curl.t b/plugins/tests/check_curl.t
new file mode 100755
index 0000000..dd56706
--- /dev/null
+++ b/plugins/tests/check_curl.t
@@ -0,0 +1,418 @@
+#! /usr/bin/perl -w -I ..
+#
+# Test check_http by having an actual HTTP server running
+#
+# To create the https server certificate:
+# openssl req -new -x509 -keyout server-key.pem -out server-cert.pem -days 
3650 -nodes
+# Country Name (2 letter code) [AU]:UK
+# State or Province Name (full name) [Some-State]:Derbyshire
+# Locality Name (eg, city) []:Belper
+# Organization Name (eg, company) [Internet Widgits Pty Ltd]:Monitoring Plugins
+# Organizational Unit Name (eg, section) []:
+# Common Name (eg, YOUR name) []:Ton Voon
+# Email Address []:tonv...@mac.com
+
+use strict;
+use Test::More;
+use NPTest;
+use FindBin qw($Bin);
+
+$ENV{'LC_TIME'} = "C";
+
+my $common_tests = 70;
+my $ssl_only_tests = 8;
+# Check that all dependent modules are available
+eval "use HTTP::Daemon 6.01;";
+plan skip_all => 'HTTP::Daemon >= 6.01 required' if $@;
+eval {
+       require HTTP::Status;
+       require HTTP::Response;
+};
+
+my $plugin = 'check_http';
+$plugin    = 'check_curl' if $0 =~ m/check_curl/mx;
+
+if ($@) {
+       plan skip_all => "Missing required module for test: $@";
+} else {
+       if (-x "./$plugin") {
+               plan tests => $common_tests * 2 + $ssl_only_tests;
+       } else {
+               plan skip_all => "No $plugin compiled";
+       }
+}
+
+my $servers = { http => 0 };   # HTTP::Daemon should always be available
+eval { require HTTP::Daemon::SSL };
+if ($@) {
+       diag "Cannot load HTTP::Daemon::SSL: $@";
+} else {
+       $servers->{https} = 0;
+}
+
+# set a fixed version, so the header size doesn't vary
+$HTTP::Daemon::VERSION = "1.00";
+
+my $port_http = 50000 + int(rand(1000));
+my $port_https = $port_http + 1;
+my $port_https_expired = $port_http + 2;
+
+# This array keeps sockets around for implementing timeouts
+my @persist;
+
+# Start up all servers
+my @pids;
+my $pid = fork();
+if ($pid) {
+       # Parent
+       push @pids, $pid;
+       if (exists $servers->{https}) {
+               # Fork a normal HTTPS server
+               $pid = fork();
+               if ($pid) {
+                       # Parent
+                       push @pids, $pid;
+                       # Fork an expired cert server
+                       $pid = fork();
+                       if ($pid) {
+                               push @pids, $pid;
+                       } else {
+                               my $d = HTTP::Daemon::SSL->new(
+                                       LocalPort => $port_https_expired,
+                                       LocalAddr => "127.0.0.1",
+                                       SSL_cert_file => 
"$Bin/certs/expired-cert.pem",
+                                       SSL_key_file => 
"$Bin/certs/expired-key.pem",
+                               ) || die;
+                               print "Please contact https expired at: <URL:", 
$d->url, ">\n";
+                               run_server( $d );
+                               exit;
+                       }
+               } else {
+                       my $d = HTTP::Daemon::SSL->new(
+                               LocalPort => $port_https,
+                               LocalAddr => "127.0.0.1",
+                               SSL_cert_file => "$Bin/certs/server-cert.pem",
+                               SSL_key_file => "$Bin/certs/server-key.pem",
+                       ) || die;
+                       print "Please contact https at: <URL:", $d->url, ">\n";
+                       run_server( $d );
+                       exit;
+               }
+       }
+       # give our webservers some time to startup
+       sleep(1);
+} else {
+       # Child
+       #print "child\n";
+       my $d = HTTP::Daemon->new(
+               LocalPort => $port_http,
+               LocalAddr => "127.0.0.1",
+       ) || die;
+       print "Please contact http at: <URL:", $d->url, ">\n";
+       run_server( $d );
+       exit;
+}
+
+# Run the same server on http and https
+sub run_server {
+       my $d = shift;
+       MAINLOOP: while (my $c = $d->accept ) {
+               while (my $r = $c->get_request) {
+                       if ($r->method eq "GET" and $r->url->path =~ 
m^/statuscode/(\d+)^) {
+                               $c->send_basic_header($1);
+                               $c->send_crlf;
+                       } elsif ($r->method eq "GET" and $r->url->path =~ 
m^/file/(.*)^) {
+                               $c->send_basic_header;
+                               $c->send_crlf;
+                               $c->send_file_response("$Bin/var/$1");
+                       } elsif ($r->method eq "GET" and $r->url->path eq 
"/slow") {
+                               $c->send_basic_header;
+                               $c->send_crlf;
+                               sleep 1;
+                               $c->send_response("slow");
+                       } elsif ($r->url->path eq "/method") {
+                               if ($r->method eq "DELETE") {
+                                       
$c->send_error(HTTP::Status->RC_METHOD_NOT_ALLOWED);
+                               } elsif ($r->method eq "foo") {
+                                       
$c->send_error(HTTP::Status->RC_NOT_IMPLEMENTED);
+                               } else {
+                                       $c->send_status_line(200, $r->method);
+                               }
+                       } elsif ($r->url->path eq "/postdata") {
+                               $c->send_basic_header;
+                               $c->send_crlf;
+                               $c->send_response($r->method.":".$r->content);
+                       } elsif ($r->url->path eq "/redirect") {
+                               $c->send_redirect( "/redirect2" );
+                       } elsif ($r->url->path eq "/redir_external") {
+                               $c->send_redirect(($d->isa('HTTP::Daemon::SSL') 
? "https" : "http") . "://169.254.169.254/redirect2" );
+                       } elsif ($r->url->path eq "/redirect2") {
+                               $c->send_basic_header;
+                               $c->send_crlf;
+                               $c->send_response(HTTP::Response->new( 200, 
'OK', undef, 'redirected' ));
+                       } elsif ($r->url->path eq "/redir_timeout") {
+                               $c->send_redirect( "/timeout" );
+                       } elsif ($r->url->path eq "/timeout") {
+                               # Keep $c from being destroyed, but prevent 
severe leaks
+                               unshift @persist, $c;
+                               delete($persist[1000]);
+                               next MAINLOOP;
+                       } elsif ($r->url->path eq "/header_check") {
+                               $c->send_basic_header;
+                               $c->send_header('foo');
+                               $c->send_crlf;
+                       } else {
+                               $c->send_error(HTTP::Status->RC_FORBIDDEN);
+                       }
+                       $c->close;
+               }
+       }
+}
+
+END {
+       foreach my $pid (@pids) {
+               if ($pid) { print "Killing $pid\n"; kill "INT", $pid }
+       }
+};
+
+if ($ARGV[0] && $ARGV[0] eq "-d") {
+       while (1) {
+               sleep 100;
+       }
+}
+
+my $result;
+my $command = "./$plugin -H 127.0.0.1";
+
+run_common_tests( { command => "$command -p $port_http" } );
+SKIP: {
+       skip "HTTP::Daemon::SSL not installed", $common_tests + $ssl_only_tests 
if ! exists $servers->{https};
+       run_common_tests( { command => "$command -p $port_https", ssl => 1 } );
+
+       $result = NPTest->testCmd( "$command -p $port_https -S -C 14" );
+       is( $result->return_code, 0, "$command -p $port_https -S -C 14" );
+       is( $result->output, 'OK - Certificate \'Ton Voon\' will expire on Sun 
Mar  3 21:41:28 2019 +0000.', "output ok" );
+
+       $result = NPTest->testCmd( "$command -p $port_https -S -C 14000" );
+       is( $result->return_code, 1, "$command -p $port_https -S -C 14000" );
+       like( $result->output, '/WARNING - Certificate \'Ton Voon\' expires in 
\d+ day\(s\) \(Sun Mar  3 21:41:28 2019 \+0000\)./', "output ok" );
+
+       # Expired cert tests
+       $result = NPTest->testCmd( "$command -p $port_https -S -C 13960,14000" 
);
+       is( $result->return_code, 2, "$command -p $port_https -S -C 
13960,14000" );
+       like( $result->output, '/CRITICAL - Certificate \'Ton Voon\' expires in 
\d+ day\(s\) \(Sun Mar  3 21:41:28 2019 \+0000\)./', "output ok" );
+
+       $result = NPTest->testCmd( "$command -p $port_https_expired -S -C 7" );
+       is( $result->return_code, 2, "$command -p $port_https_expired -S -C 7" 
);
+       is( $result->output,
+               'CRITICAL - Certificate \'Ton Voon\' expired on Thu Mar  5 
00:13:16 2009 +0000.',
+               "output ok" );
+
+}
+
+sub run_common_tests {
+       my ($opts) = @_;
+       my $command = $opts->{command};
+       if ($opts->{ssl}) {
+               $command .= " --ssl";
+       }
+
+       $result = NPTest->testCmd( "$command -u /file/root" );
+       is( $result->return_code, 0, "/file/root");
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - 274 bytes in 
[\d\.]+ second/', "Output correct" );
+
+       $result = NPTest->testCmd( "$command -u /file/root -s Root" );
+       is( $result->return_code, 0, "/file/root search for string");
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - 274 bytes in 
[\d\.]+ second/', "Output correct" );
+
+       $result = NPTest->testCmd( "$command -u /file/root -s NonRoot" );
+       is( $result->return_code, 2, "Missing string check");
+       like( $result->output, qr%^HTTP CRITICAL: HTTP/1\.1 200 OK - string 
'NonRoot' not found on 'https?://127\.0\.0\.1:\d+/file/root'%, "Shows search 
string and location");
+
+       $result = NPTest->testCmd( "$command -u /file/root -s 
NonRootWithOver30charsAndMoreFunThanAWetFish" );
+       is( $result->return_code, 2, "Missing string check");
+       like( $result->output, qr%HTTP CRITICAL: HTTP/1\.1 200 OK - string 
'NonRootWithOver30charsAndM...' not found on 
'https?://127\.0\.0\.1:\d+/file/root'%, "Shows search string and location");
+
+       $result = NPTest->testCmd( "$command -u /header_check -d foo" );
+       is( $result->return_code, 0, "header_check search for string");
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - 96 bytes in 
[\d\.]+ second/', "Output correct" );
+
+       $result = NPTest->testCmd( "$command -u /header_check -d bar" );
+       is( $result->return_code, 2, "Missing header string check");
+       like( $result->output, qr%^HTTP CRITICAL: HTTP/1\.1 200 OK - header 
'bar' not found on 'https?://127\.0\.0\.1:\d+/header_check'%, "Shows search 
string and location");
+
+       my $cmd;
+       $cmd = "$command -u /slow";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, "$cmd");
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in 
[\d\.]+ second/', "Output correct: ".$result->output );
+       $result->output =~ /in ([\d\.]+) second/;
+       cmp_ok( $1, ">", 1, "Time is > 1 second" );
+
+       $cmd = "$command -u /statuscode/200";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in 
[\d\.]+ second/', "Output correct: ".$result->output );
+
+       $cmd = "$command -u /statuscode/200 -e 200";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: Status line output matched "200" - 
\d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output );
+
+       $cmd = "$command -u /statuscode/201";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 201 Created - \d+ bytes in 
[\d\.]+ second /', "Output correct: ".$result->output );
+
+       $cmd = "$command -u /statuscode/201 -e 201";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: Status line output matched "201" - 
\d+ bytes in [\d\.]+ second /', "Output correct: ".$result->output );
+
+       $cmd = "$command -u /statuscode/201 -e 200";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 2, $cmd);
+       like( $result->output, '/^HTTP CRITICAL - Invalid HTTP response 
received from host on port \d+: HTTP/1.1 201 Created/', "Output correct: 
".$result->output );
+
+       $cmd = "$command -u /statuscode/200 -e 200,201,202";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: Status line output matched 
"200,201,202" - \d+ bytes in [\d\.]+ second/', "Output correct: 
".$result->output );
+
+       $cmd = "$command -u /statuscode/201 -e 200,201,202";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: Status line output matched 
"200,201,202" - \d+ bytes in [\d\.]+ second/', "Output correct: 
".$result->output );
+
+       $cmd = "$command -u /statuscode/203 -e 200,201,202";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 2, $cmd);
+       like( $result->output, '/^HTTP CRITICAL - Invalid HTTP response 
received from host on port (\d+): HTTP/1.1 203 Non-Authoritative Information/', 
"Output correct: ".$result->output );
+
+       $cmd = "$command -j HEAD -u /method";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 HEAD - \d+ bytes in 
[\d\.]+ second/', "Output correct: ".$result->output );
+
+       $cmd = "$command -j POST -u /method";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 POST - \d+ bytes in 
[\d\.]+ second/', "Output correct: ".$result->output );
+
+       $cmd = "$command -j GET -u /method";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 GET - \d+ bytes in 
[\d\.]+ second/', "Output correct: ".$result->output );
+
+       $cmd = "$command -u /method";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 GET - \d+ bytes in 
[\d\.]+ second/', "Output correct: ".$result->output );
+
+       $cmd = "$command -P foo -u /method";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 POST - \d+ bytes in 
[\d\.]+ second/', "Output correct: ".$result->output );
+
+       $cmd = "$command -j DELETE -u /method";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 1, $cmd);
+       like( $result->output, '/^HTTP WARNING: HTTP/1.1 405 Method Not 
Allowed/', "Output correct: ".$result->output );
+
+       $cmd = "$command -j foo -u /method";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 2, $cmd);
+       like( $result->output, '/^HTTP CRITICAL: HTTP/1.1 501 Not 
Implemented/', "Output correct: ".$result->output );
+
+       $cmd = "$command -P stufftoinclude -u /postdata -s POST:stufftoinclude";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in 
[\d\.]+ second/', "Output correct: ".$result->output );
+
+       $cmd = "$command -j PUT -P stufftoinclude -u /postdata -s 
PUT:stufftoinclude";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in 
[\d\.]+ second/', "Output correct: ".$result->output );
+
+       # To confirm that the free doesn't segfault
+       $cmd = "$command -P stufftoinclude -j PUT -u /postdata -s 
PUT:stufftoinclude";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in 
[\d\.]+ second/', "Output correct: ".$result->output );
+
+       $cmd = "$command -u /redirect";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 301 Moved Permanently - \d+ 
bytes in [\d\.]+ second/', "Output correct: ".$result->output );
+
+       $cmd = "$command -f follow -u /redirect";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in 
[\d\.]+ second/', "Output correct: ".$result->output );
+
+       $cmd = "$command -u /redirect -k 'follow: me'";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 301 Moved Permanently - \d+ 
bytes in [\d\.]+ second/', "Output correct: ".$result->output );
+
+       $cmd = "$command -f follow -u /redirect -k 'follow: me'";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in 
[\d\.]+ second/', "Output correct: ".$result->output );
+
+       $cmd = "$command -f sticky -u /redirect -k 'follow: me'";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in 
[\d\.]+ second/', "Output correct: ".$result->output );
+
+       $cmd = "$command -f stickyport -u /redirect -k 'follow: me'";
+       $result = NPTest->testCmd( $cmd );
+       is( $result->return_code, 0, $cmd);
+       like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in 
[\d\.]+ second/', "Output correct: ".$result->output );
+
+  # These tests may block
+       print "ALRM\n";
+
+       # stickyport - on full urlS port is set back to 80 otherwise
+       $cmd = "$command -f stickyport -u /redir_external -t 5 -s redirected";
+       eval {
+               local $SIG{ALRM} = sub { die "alarm\n" };
+               alarm(2);
+               $result = NPTest->testCmd( $cmd );
+               alarm(0);       };
+       isnt( $@, "alarm\n", $cmd );
+       is( $result->return_code, 0, $cmd );
+
+       # Let's hope there won't be any web server on :80 returning 
"redirected"!
+       $cmd = "$command -f sticky -u /redir_external -t 5 -s redirected";
+       eval {
+               local $SIG{ALRM} = sub { die "alarm\n" };
+               alarm(2);
+               $result = NPTest->testCmd( $cmd );
+               alarm(0); };
+       isnt( $@, "alarm\n", $cmd );
+       isnt( $result->return_code, 0, $cmd );
+
+       # Test an external address - timeout
+       SKIP: {
+               skip "This doesn't seems to work all the time", 1 unless 
($ENV{HTTP_EXTERNAL});
+               $cmd = "$command -f follow -u /redir_external -t 5";
+               eval {
+                       $result = NPTest->testCmd( $cmd, 2 );
+               };
+               like( $@, "/timeout in command: $cmd/", $cmd );
+       }
+
+       $cmd = "$command -u /timeout -t 5";
+       eval {
+               $result = NPTest->testCmd( $cmd, 2 );
+       };
+       like( $@, "/timeout in command: $cmd/", $cmd );
+
+       $cmd = "$command -f follow -u /redir_timeout -t 2";
+       eval {
+               $result = NPTest->testCmd( $cmd, 5 );
+       };
+       is( $@, "", $cmd );
+
+}

Reply via email to