ltsdb/clients/record_tlscert

48 lines
1.2 KiB
Plaintext
Raw Normal View History

2022-11-20 18:43:45 +01:00
#!/usr/bin/python3
import argparse
import socket
import ssl
import time
2023-09-20 11:00:39 +02:00
import ltsdb_record
2022-11-20 18:43:45 +01:00
ap = argparse.ArgumentParser()
ap.add_argument("--verbose", action="store_true")
2022-11-20 18:43:45 +01:00
ap.add_argument("hostname")
ap.add_argument("port", type=int, default=443, nargs="?")
args = ap.parse_args()
now = time.time()
report0 = []
with socket.create_connection((args.hostname, args.port)) as sock:
context = ssl.create_default_context()
2022-11-20 18:46:39 +01:00
try:
with context.wrap_socket(sock, server_hostname=args.hostname) as ssock:
cert = ssock.getpeercert()
not_after = ssl.cert_time_to_seconds(cert["notAfter"])
delta = not_after - now
except ssl.SSLCertVerificationError as e:
print("got error %s; setting delta to 0", e)
2022-11-20 18:46:39 +01:00
delta = 0
report0.append({ "measure": "tls_cert_ttl", "unit": "s", "value": delta })
2022-11-20 18:43:45 +01:00
report = [
{
"description": {
"hostname": args.hostname,
"port": args.port,
"measure": r["measure"],
"unit": r["unit"]
},
"data": [
[now, r["value"]]
]
}
for r in report0
]
2023-09-20 11:00:39 +02:00
success = ltsdb_record.record_observations(report)
exit(1 - success)