diff options
author | Ton Voon <tonvoon@users.sourceforge.net> | 2003-04-08 20:37:13 +0000 |
---|---|---|
committer | Ton Voon <tonvoon@users.sourceforge.net> | 2003-04-08 20:37:13 +0000 |
commit | 040ddd32a3ddae00e31b54fb46d95692896a40f7 (patch) | |
tree | f85830e849a47b02d6ef2e92003d96f2b82f51b3 | |
parent | 6326b0f9045192beddf462fe4b5706349b8ff8b1 (diff) | |
download | monitoring-plugins-040ddd32a3ddae00e31b54fb46d95692896a40f7.tar.gz |
Changed // to /* */ comments as some compilers do not like them
git-svn-id: https://nagiosplug.svn.sourceforge.net/svnroot/nagiosplug/nagiosplug/trunk@478 f882894a-f735-0410-b71e-b25c423dba1c
-rw-r--r-- | plugins/check_hpjd.c | 4 | ||||
-rw-r--r-- | plugins/check_nt.c | 33 |
2 files changed, 18 insertions, 19 deletions
diff --git a/plugins/check_hpjd.c b/plugins/check_hpjd.c index d8583724..9d8fae2b 100644 --- a/plugins/check_hpjd.c +++ b/plugins/check_hpjd.c | |||
@@ -519,10 +519,10 @@ print_usage (void) | |||
519 | return STATE_UNKNOWN; | 519 | return STATE_UNKNOWN; |
520 | } | 520 | } |
521 | 521 | ||
522 | // get the IP address of the JetDirect device | 522 | /* get the IP address of the JetDirect device */ |
523 | strcpy(address,argv[1]); | 523 | strcpy(address,argv[1]); |
524 | 524 | ||
525 | // get the community name to use for SNMP communication | 525 | /* get the community name to use for SNMP communication */ |
526 | if(argc>=3) | 526 | if(argc>=3) |
527 | strcpy(community,argv[2]); | 527 | strcpy(community,argv[2]); |
528 | else | 528 | else |
diff --git a/plugins/check_nt.c b/plugins/check_nt.c index b29d8b7a..1305a333 100644 --- a/plugins/check_nt.c +++ b/plugins/check_nt.c | |||
@@ -28,7 +28,6 @@ | |||
28 | * | 28 | * |
29 | *****************************************************************************/ | 29 | *****************************************************************************/ |
30 | 30 | ||
31 | //#include "stdlib.h" | ||
32 | #include "config.h" | 31 | #include "config.h" |
33 | #include "common.h" | 32 | #include "common.h" |
34 | #include "netutils.h" | 33 | #include "netutils.h" |
@@ -121,15 +120,15 @@ int main(int argc, char **argv){ | |||
121 | 120 | ||
122 | if (check_value_list==TRUE) { | 121 | if (check_value_list==TRUE) { |
123 | if (strtolarray(&lvalue_list,value_list,",")==TRUE) { | 122 | if (strtolarray(&lvalue_list,value_list,",")==TRUE) { |
124 | // -l parameters is present with only integers | 123 | /* -l parameters is present with only integers */ |
125 | return_code=STATE_OK; | 124 | return_code=STATE_OK; |
126 | asprintf(&temp_string,"CPU Load"); | 125 | asprintf(&temp_string,"CPU Load"); |
127 | while (lvalue_list[0+offset]>0 && lvalue_list[0+offset]<=17280 && | 126 | while (lvalue_list[0+offset]>0 && lvalue_list[0+offset]<=17280 && |
128 | lvalue_list[1+offset]>=0 && lvalue_list[1+offset]<=100 && | 127 | lvalue_list[1+offset]>=0 && lvalue_list[1+offset]<=100 && |
129 | lvalue_list[2+offset]>=0 && lvalue_list[2+offset]<=100) { | 128 | lvalue_list[2+offset]>=0 && lvalue_list[2+offset]<=100) { |
130 | // loop until one of the parameters is wrong or not present | 129 | /* loop until one of the parameters is wrong or not present */ |
131 | 130 | ||
132 | // Send request and retrieve data | 131 | /* Send request and retrieve data */ |
133 | asprintf(&send_buffer,"%s&2&%lu",req_password,lvalue_list[0+offset]); | 132 | asprintf(&send_buffer,"%s&2&%lu",req_password,lvalue_list[0+offset]); |
134 | result=process_tcp_request(server_address,server_port,send_buffer,recv_buffer,sizeof(recv_buffer)); | 133 | result=process_tcp_request(server_address,server_port,send_buffer,recv_buffer,sizeof(recv_buffer)); |
135 | if(result!=STATE_OK) | 134 | if(result!=STATE_OK) |
@@ -142,7 +141,7 @@ int main(int argc, char **argv){ | |||
142 | 141 | ||
143 | utilization=strtoul(recv_buffer,NULL,10); | 142 | utilization=strtoul(recv_buffer,NULL,10); |
144 | 143 | ||
145 | // Check if any of the request is in a warning or critical state | 144 | /* Check if any of the request is in a warning or critical state */ |
146 | if(utilization >= lvalue_list[2+offset]) | 145 | if(utilization >= lvalue_list[2+offset]) |
147 | return_code=STATE_CRITICAL; | 146 | return_code=STATE_CRITICAL; |
148 | else if(utilization >= lvalue_list[1+offset] && return_code<STATE_WARNING) | 147 | else if(utilization >= lvalue_list[1+offset] && return_code<STATE_WARNING) |
@@ -150,10 +149,10 @@ int main(int argc, char **argv){ | |||
150 | 149 | ||
151 | asprintf(&output_message," %lu%% (%lu min average)", utilization, lvalue_list[0+offset]); | 150 | asprintf(&output_message," %lu%% (%lu min average)", utilization, lvalue_list[0+offset]); |
152 | asprintf(&temp_string,"%s%s",temp_string,output_message); | 151 | asprintf(&temp_string,"%s%s",temp_string,output_message); |
153 | offset+=3; //move across the array | 152 | offset+=3; /* move across the array */ |
154 | } | 153 | } |
155 | if (strlen(temp_string)>10) { | 154 | if (strlen(temp_string)>10) { |
156 | // we had at least on loop | 155 | /* we had at least on loop */ |
157 | asprintf(&output_message,"%s",temp_string); | 156 | asprintf(&output_message,"%s",temp_string); |
158 | } | 157 | } |
159 | else | 158 | else |
@@ -236,7 +235,7 @@ int main(int argc, char **argv){ | |||
236 | else if(vars_to_check==CHECK_SERVICESTATE || vars_to_check==CHECK_PROCSTATE){ | 235 | else if(vars_to_check==CHECK_SERVICESTATE || vars_to_check==CHECK_PROCSTATE){ |
237 | 236 | ||
238 | if (check_value_list==TRUE) { | 237 | if (check_value_list==TRUE) { |
239 | preparelist(value_list); // replace , between services with & to send the request | 238 | preparelist(value_list); /* replace , between services with & to send the request */ |
240 | asprintf(&send_buffer,"%s&%u&%s&%s", req_password,(vars_to_check==CHECK_SERVICESTATE)?5:6, | 239 | asprintf(&send_buffer,"%s&%u&%s&%s", req_password,(vars_to_check==CHECK_SERVICESTATE)?5:6, |
241 | (show_all==TRUE)?"ShowAll":"ShowFail",value_list); | 240 | (show_all==TRUE)?"ShowAll":"ShowFail",value_list); |
242 | result=process_tcp_request(server_address,server_port,send_buffer,recv_buffer,sizeof(recv_buffer)); | 241 | result=process_tcp_request(server_address,server_port,send_buffer,recv_buffer,sizeof(recv_buffer)); |
@@ -286,7 +285,7 @@ int main(int argc, char **argv){ | |||
286 | else if(vars_to_check==CHECK_COUNTER) { | 285 | else if(vars_to_check==CHECK_COUNTER) { |
287 | 286 | ||
288 | if (check_value_list==TRUE) { | 287 | if (check_value_list==TRUE) { |
289 | preparelist(value_list); // replace , between services with & to send the request | 288 | preparelist(value_list); /* replace , between services with & to send the request */ |
290 | asprintf(&send_buffer,"%s&8&%s", req_password,value_list); | 289 | asprintf(&send_buffer,"%s&8&%s", req_password,value_list); |
291 | result=process_tcp_request(server_address,server_port,send_buffer,recv_buffer,sizeof(recv_buffer)); | 290 | result=process_tcp_request(server_address,server_port,send_buffer,recv_buffer,sizeof(recv_buffer)); |
292 | if (result!=STATE_OK) | 291 | if (result!=STATE_OK) |
@@ -297,7 +296,7 @@ int main(int argc, char **argv){ | |||
297 | exit(STATE_UNKNOWN); | 296 | exit(STATE_UNKNOWN); |
298 | } | 297 | } |
299 | 298 | ||
300 | strtok(value_list,"&"); // burn the first parameters | 299 | strtok(value_list,"&"); /* burn the first parameters */ |
301 | description = strtok(NULL,"&"); | 300 | description = strtok(NULL,"&"); |
302 | counter_value = atof(recv_buffer); | 301 | counter_value = atof(recv_buffer); |
303 | if (description == NULL) | 302 | if (description == NULL) |
@@ -306,7 +305,7 @@ int main(int argc, char **argv){ | |||
306 | asprintf(&output_message, description, counter_value); | 305 | asprintf(&output_message, description, counter_value); |
307 | 306 | ||
308 | if (critical_value > warning_value) { | 307 | if (critical_value > warning_value) { |
309 | // Normal thresholds | 308 | /* Normal thresholds */ |
310 | if(check_critical_value==TRUE && counter_value >= critical_value) | 309 | if(check_critical_value==TRUE && counter_value >= critical_value) |
311 | return_code=STATE_CRITICAL; | 310 | return_code=STATE_CRITICAL; |
312 | else if (check_warning_value==TRUE && counter_value >= warning_value) | 311 | else if (check_warning_value==TRUE && counter_value >= warning_value) |
@@ -315,7 +314,7 @@ int main(int argc, char **argv){ | |||
315 | return_code=STATE_OK; | 314 | return_code=STATE_OK; |
316 | } | 315 | } |
317 | else { | 316 | else { |
318 | // inverse thresholds | 317 | /* inverse thresholds */ |
319 | if(check_critical_value==TRUE && counter_value <= critical_value) | 318 | if(check_critical_value==TRUE && counter_value <= critical_value) |
320 | return_code=STATE_CRITICAL; | 319 | return_code=STATE_CRITICAL; |
321 | else if (check_warning_value==TRUE && counter_value <= warning_value) | 320 | else if (check_warning_value==TRUE && counter_value <= warning_value) |
@@ -333,7 +332,7 @@ int main(int argc, char **argv){ | |||
333 | else if(vars_to_check==CHECK_FILEAGE) { | 332 | else if(vars_to_check==CHECK_FILEAGE) { |
334 | 333 | ||
335 | if (check_value_list==TRUE) { | 334 | if (check_value_list==TRUE) { |
336 | preparelist(value_list); // replace , between services with & to send the request | 335 | preparelist(value_list); /* replace , between services with & to send the request */ |
337 | asprintf(&send_buffer,"%s&9&%s", req_password,value_list); | 336 | asprintf(&send_buffer,"%s&9&%s", req_password,value_list); |
338 | result=process_tcp_request(server_address,server_port,send_buffer,recv_buffer,sizeof(recv_buffer)); | 337 | result=process_tcp_request(server_address,server_port,send_buffer,recv_buffer,sizeof(recv_buffer)); |
339 | if (result!=STATE_OK) | 338 | if (result!=STATE_OK) |
@@ -349,7 +348,7 @@ int main(int argc, char **argv){ | |||
349 | asprintf(&output_message, description); | 348 | asprintf(&output_message, description); |
350 | 349 | ||
351 | if (critical_value > warning_value) { | 350 | if (critical_value > warning_value) { |
352 | // Normal thresholds | 351 | /* Normal thresholds */ |
353 | if(check_critical_value==TRUE && age_in_minutes >= critical_value) | 352 | if(check_critical_value==TRUE && age_in_minutes >= critical_value) |
354 | return_code=STATE_CRITICAL; | 353 | return_code=STATE_CRITICAL; |
355 | else if (check_warning_value==TRUE && age_in_minutes >= warning_value) | 354 | else if (check_warning_value==TRUE && age_in_minutes >= warning_value) |
@@ -358,7 +357,7 @@ int main(int argc, char **argv){ | |||
358 | return_code=STATE_OK; | 357 | return_code=STATE_OK; |
359 | } | 358 | } |
360 | else { | 359 | else { |
361 | // inverse thresholds | 360 | /* inverse thresholds */ |
362 | if(check_critical_value==TRUE && age_in_minutes <= critical_value) | 361 | if(check_critical_value==TRUE && age_in_minutes <= critical_value) |
363 | return_code=STATE_CRITICAL; | 362 | return_code=STATE_CRITICAL; |
364 | else if (check_warning_value==TRUE && age_in_minutes <= warning_value) | 363 | else if (check_warning_value==TRUE && age_in_minutes <= warning_value) |
@@ -563,7 +562,7 @@ void print_help(void) | |||
563 | } | 562 | } |
564 | 563 | ||
565 | int strtolarray(unsigned long *array, char *string, char *delim) { | 564 | int strtolarray(unsigned long *array, char *string, char *delim) { |
566 | // split a <delim> delimited string into a long array | 565 | /* split a <delim> delimited string into a long array */ |
567 | int idx=0; | 566 | int idx=0; |
568 | char *t1; | 567 | char *t1; |
569 | 568 | ||
@@ -582,7 +581,7 @@ int strtolarray(unsigned long *array, char *string, char *delim) { | |||
582 | } | 581 | } |
583 | 582 | ||
584 | void preparelist(char *string) { | 583 | void preparelist(char *string) { |
585 | // Replace all , with & which is the delimiter for the request | 584 | /* Replace all , with & which is the delimiter for the request */ |
586 | int i; | 585 | int i; |
587 | 586 | ||
588 | for (i = 0; i < strlen(string); i++) | 587 | for (i = 0; i < strlen(string); i++) |