mirror of
https://github.com/TwiN/gatus.git
synced 2024-11-28 19:03:24 +01:00
124 lines
3.2 KiB
Go
124 lines
3.2 KiB
Go
package client
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"errors"
|
|
"net"
|
|
"net/http"
|
|
"net/smtp"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/go-ping/ping"
|
|
)
|
|
|
|
var (
|
|
secureHTTPClient *http.Client
|
|
insecureHTTPClient *http.Client
|
|
|
|
// pingTimeout is the timeout for the Ping function
|
|
// This is mainly exposed for testing purposes
|
|
pingTimeout = 5 * time.Second
|
|
|
|
// httpTimeout is the timeout for secureHTTPClient and insecureHTTPClient
|
|
httpTimeout = 10 * time.Second
|
|
)
|
|
|
|
// GetHTTPClient returns the shared HTTP client
|
|
func GetHTTPClient(insecure bool) *http.Client {
|
|
if insecure {
|
|
if insecureHTTPClient == nil {
|
|
insecureHTTPClient = &http.Client{
|
|
Timeout: httpTimeout,
|
|
Transport: &http.Transport{
|
|
MaxIdleConns: 100,
|
|
MaxIdleConnsPerHost: 20,
|
|
Proxy: http.ProxyFromEnvironment,
|
|
TLSClientConfig: &tls.Config{
|
|
InsecureSkipVerify: true,
|
|
},
|
|
},
|
|
CheckRedirect: func(req *http.Request, via []*http.Request) error {
|
|
return http.ErrUseLastResponse // Don't follow redirects
|
|
},
|
|
}
|
|
}
|
|
return insecureHTTPClient
|
|
}
|
|
if secureHTTPClient == nil {
|
|
secureHTTPClient = &http.Client{
|
|
Timeout: httpTimeout,
|
|
Transport: &http.Transport{
|
|
MaxIdleConns: 100,
|
|
MaxIdleConnsPerHost: 20,
|
|
Proxy: http.ProxyFromEnvironment,
|
|
},
|
|
CheckRedirect: func(req *http.Request, via []*http.Request) error {
|
|
return http.ErrUseLastResponse // Don't follow redirects
|
|
},
|
|
}
|
|
}
|
|
return secureHTTPClient
|
|
}
|
|
|
|
// CanCreateTCPConnection checks whether a connection can be established with a TCP service
|
|
func CanCreateTCPConnection(address string) bool {
|
|
conn, err := net.DialTimeout("tcp", address, 5*time.Second)
|
|
if err != nil {
|
|
return false
|
|
}
|
|
_ = conn.Close()
|
|
return true
|
|
}
|
|
|
|
// CanPerformStartTLS checks whether a connection can be established to an address using the STARTTLS protocol
|
|
func CanPerformStartTLS(address string, insecure bool) (connected bool, certificate *x509.Certificate, err error) {
|
|
hostAndPort := strings.Split(address, ":")
|
|
if len(hostAndPort) != 2 {
|
|
return false, nil, errors.New("invalid address for starttls, format must be host:port")
|
|
}
|
|
smtpClient, err := smtp.Dial(address)
|
|
if err != nil {
|
|
return
|
|
}
|
|
err = smtpClient.StartTLS(&tls.Config{
|
|
InsecureSkipVerify: insecure,
|
|
ServerName: hostAndPort[0],
|
|
})
|
|
if err != nil {
|
|
return
|
|
}
|
|
if state, ok := smtpClient.TLSConnectionState(); ok {
|
|
certificate = state.PeerCertificates[0]
|
|
} else {
|
|
return false, nil, errors.New("could not get TLS connection state")
|
|
}
|
|
return true, certificate, nil
|
|
}
|
|
|
|
// Ping checks if an address can be pinged and returns the round-trip time if the address can be pinged
|
|
//
|
|
// Note that this function takes at least 100ms, even if the address is 127.0.0.1
|
|
func Ping(address string) (bool, time.Duration) {
|
|
pinger, err := ping.NewPinger(address)
|
|
if err != nil {
|
|
return false, 0
|
|
}
|
|
pinger.Count = 1
|
|
pinger.Timeout = pingTimeout
|
|
pinger.SetPrivileged(true)
|
|
err = pinger.Run()
|
|
if err != nil {
|
|
return false, 0
|
|
}
|
|
if pinger.Statistics() != nil {
|
|
// If the packet loss is 100, it means that the packet didn't reach the host
|
|
if pinger.Statistics().PacketLoss == 100 {
|
|
return false, pinger.Timeout
|
|
}
|
|
return true, pinger.Statistics().MaxRtt
|
|
}
|
|
return true, 0
|
|
}
|