summaryrefslogtreecommitdiffstats
AgeCommit message (Collapse)AuthorFilesLines
2021-05-18Use openssl generated certJacob Hansen1-2/+6
The SSL certificate generate using make-ssl-cert seems to not work well with a our plugins. Causing a "CN could not be found" error to be shown. Using an OpenSSL generated certifiticate, seems to work better. Signed-off-by: Jacob Hansen <jhansen@op5.com>
2021-04-30Fix check_dhcp testsAksel Sjögren1-2/+7
* try to use "/usr/sbin/ip" before "ifconfig" since the latter is obsolete on Linux to figure out interface to listen for DHCP messages. But keeping ifconfig method just in case. Without this, tests fail on boxes without ifconfig AND the correct interface named ethX. * amend possible failure responses, as check_dhcp might get a DHCPOFFER, but from an unexpected address - which happens if the box running tests are on a network with a DHCP server.
2021-04-30Add test-debug for plugins-rootAksel Sjögren1-0/+3
Fixes "No rule to make target 'test-debug'" when running "make test-debug" in root dir.
2021-04-30Fix conditional tests for check_http, check_curlAksel Sjögren2-4/+4
Set correct number of tests in skip- blocks to avoid the error "Bad plan. You planned 50 tests but ran 55" when run with/without /usr/bin/faketime and NP_INTERNET_ACCESS=yes/no.
2021-04-30Attempt to fix check_usersJacob Hansen1-4/+6
Signed-off-by: Jacob Hansen <jhansen@op5.com>
2021-04-30migrate travis ci to github actionsSven Nierlein4-102/+180
2021-04-30fix fping testSven Nierlein1-6/+3
in case of dns errors, fping returns an unknown and thats ok.
2021-04-13check_curl: Fix bug where headers beginning with HTTP_ cause the status line ↵Barak Shohat1-1/+1
parsing to fail.
2021-04-09Merge pull request #1671 from monitoring-plugins/feature_check_curlSven Nierlein1-6/+23
Feature check curl
2021-04-08check_curl: backported --show-body/-B to print body (from check_http)refs/pull/1671/headAndreas Baumann1-4/+15
2021-04-08check_curl: make -C obvious (from check_http, part 2)Andreas Baumann1-0/+4
2021-04-08check_curl: make -C obvious (from check_http)Andreas Baumann1-1/+3
2021-04-08check_curl: Increase regexp limit (to 1024 as in check_http)Andreas Baumann1-1/+1
2021-04-07Merge pull request #1669 from bazzisoft/verify-certSven Nierlein2-4/+18
Add an option to check_curl to verify the peer certificate & host using the system CA's
2021-04-07Merge pull request #1554 from stblassitude/masterSven Nierlein1-1/+7
Docs check_http: make -C obvious
2021-04-07Merge pull request #1566 from hydrapolic/masterSven Nierlein1-1/+1
plugins: check_http: Increase regexp limit
2021-04-07Merge pull request #1465 from lausser/masterSven Nierlein1-2/+3
check_snmp: put the "c" (to mark a counter) after the perfdata value
2021-04-07Merge pull request #1663 from waja/debian_982847_2waja1-1/+1
Using snprintf which honors the buffers size and guarantees null temination. (Closes: #1601)
2021-04-07Add an option to check_curl to verify the peer certificate & host using the ↵refs/pull/1669/headBarak Shohat2-4/+18
system CA's
2021-04-07Merge pull request #1668 from bazzisoft/masterSven Nierlein2-5/+5
Update check_curl.c to display a specific human-readable error message where possible
2021-04-07Updated check_curl.c to display a specific human-readable error message ↵refs/pull/1668/headBarak Shohat2-5/+5
where possible
2021-04-07Merge pull request #1666 from sni/check_curl_fix_header_parserSven Nierlein2-4/+14
fix check_curl crash if http header contains leading spaces
2021-04-07Merge pull request #1644 from ghciv6/check_mysql_query_1562Sven Nierlein1-6/+6
- fix for issue #1562
2021-03-22Merge pull request #1667 from monitoring-plugins/feature_check_curlSven Nierlein1-8/+31
check curl bugfixes
2021-03-11fix check_curl crash if http header contains leading spacesrefs/pull/1666/headSven Nierlein2-4/+14
check_curl crashes when a (broken) http server returns invalid http header with leading spaces or double colons. This PR adds a fix and a test case for this. Signed-off-by: Sven Nierlein <sven@nierlein.de>
2021-03-08check_curl: added string_statuscode function for printing HTTP/1.1 and ↵refs/pull/1667/headAndreas Baumann1-5/+28
HTTP/2 correctly
2021-02-15Using snprintf which honors the buffers size and guarantees null ↵refs/pull/1663/headFlorian Lohoff1-1/+1
termination. (Closes: #1601) As strcpy may overflow the resulting buffer: flo@p5:~$ /tmp/f/usr/lib/nagios/plugins/check_pgsql -d "$(seq 1 10000)" *** buffer overflow detected ***: terminated Aborted I would propose to change the code rather like this, using snprintf which honors the buffers size and guarantees null termination.
2021-02-08Merge branch 'master' into feature_check_curlAndreas Baumann1-3/+17
2021-02-04Merge pull request #1649 from DerDakon/split-addrSven Nierlein1-3/+17
check_dns: split multiple IP addresses passed in one -a argument
2021-01-19check_curl: fixed a potential buffer overflow in url bufferAndreas Baumann1-1/+1
2021-01-19check_curl: fixed help, usage and errors for TLS 1.3Andreas Baumann1-2/+2
2020-12-19Merge pull request #1652 from timgates42/bugfix_typo_conspicuouslySven Nierlein1-1/+1
docs: fix simple typo, conspicuosly -> conspicuously
2020-12-19docs: fix simple typo, conspicuosly -> conspicuouslyrefs/pull/1652/headTim Gates1-1/+1
There is a small typo in plugins-root/check_icmp.c. Should read `conspicuously` rather than `conspicuosly`.
2020-12-09Prepare the release docu for 2024 when we release 2.4Jan Wagner1-14/+14
2020-12-09New version in NEWSJan Wagner1-0/+5
2020-12-09New version number for gitJan Wagner2-2/+2
2020-12-09Draft NEWSv2.3refs/pull/1651/headJan Wagner1-1/+35
2020-12-09Updating contributorsJan Wagner1-0/+24
2020-12-09Updating version numberJan Wagner2-2/+2
2020-12-08Merge pull request #1650 from sni/fix_check_mailq_optionswaja1-3/+5
check_mailq: restore accidentially removed options
2020-12-08check_mailq: restore accidentially removed optionsrefs/pull/1650/headSven Nierlein1-3/+5
with https://github.com/monitoring-plugins/monitoring-plugins/issues/381 -W and -C have been removed. It would have been sufficient to only remove the long options. Restoring short options.. - fixes https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954961
2020-11-02check_dns: split multiple IP addresses passed in one -a argumentrefs/pull/1649/headRolf Eike Beer1-3/+17
2020-10-02Merge pull request #1645 from Prathu121/masterSven Nierlein1-2/+2
Improves and fixes
2020-10-01Update READMErefs/pull/1645/headPrathamesh Bhanuse1-2/+2
2020-09-23Merge pull request #1514 from Rasp8e/masterSven Nierlein1-0/+15
Proxy authorization is now kept when using PROXY + CONNECT to HTTPS
2020-09-15- fix for issue #1562refs/pull/1644/headghciv61-6/+6
1st compare then free up resources
2020-05-20Merge pull request #1634 from ghciv6/check_dns_detect_unreach_svcSven Nierlein1-1/+6
detect unreachable dns service in nslookup output
2020-05-20detect unreachable dns service in nslookup output (from bind-utils-9.8.2)refs/pull/1634/headghciv61-1/+6
prevent core if error_scan detects an error in a line without ':'
2020-05-19Merge pull request #1535 from monitoring-plugins/feature_check_curlSven Nierlein18-59/+4325
Feature check curl
2020-05-18check_curl: host_name may be nullrefs/pull/1535/headSven Nierlein1-4/+4
for example when using like: ./check_curl localhost