A plugin that check the http code of a target for Minion
It assumes that you already have Minion installed (https://github.com/mozilla/minion)
- Clone the project with
git clone https://github.com/glestel/minion-http-code-checker-plugin.git
- If needed load the virtualenv with
source {minion-directory}/minion/env/bin/activate
- Then run in the minion-http-code-checker-plugin directory :
python setup.py develop
[
{
"configuration": {
"report_dir": "/tmp/artifacts/",
"expected_code": 403,
"user-agent": "WordPress/2.1.1",
"groups_targets": [
"Target_Public"
],
},
"description": "Used to check the http response of a target",
"plugin_name": "minion.plugins.http_code_checker.HTTPCodeCheckerPlugin"
}
]
The list of available options are :
report_dir
: directory were the logging file will be written. Default is/tmp/artifacts
expected_code
: HTTP code expected when the GET request will be made against the target. Default is200
user-agent
: user agent used with the requestgroups_targets
: the plugin will use as target for audit every target listed within each Minion's groupsinclude_calling_target
: the target used on Minion to launch the script will not be added to the target list. Default isfalse
store_success
: every target responding successfully will be added to an Info issue. Default isfalse
enforce_ssl
: skip ssl verification when making request. Default istrue