summaryrefslogtreecommitdiffstats
path: root/plugins
AgeCommit message (Collapse)AuthorFilesLines
6 dayscheck_disk: clang-formatRincewindsHat1-1001/+962
6 dayscheck_dig: Linter fixesRincewindsHat1-3/+3
6 dayscheck_dig: do not export local symbolsRincewindsHat1-15/+15
6 dayscheck_dig: clang-formatRincewindsHat1-325/+297
6 dayscheck_dbi: linter fixesRincewindsHat1-6/+11
6 dayscheck_dbi: do not export local symbolsRincewindsHat1-22/+22
6 dayscheck_dbi: Update copyrightRincewindsHat1-3/+3
6 dayscheck_dbi: clang-formatRincewindsHat1-421/+363
6 dayscheck_curl: Linter fixesRincewindsHat1-27/+28
6 dayscheck_curl: do not export local variables and remove unused onesRincewindsHat1-129/+118
6 dayscheck_curl: Update copyrightRincewindsHat1-2/+2
6 dayscheck_curl: clang-formatRincewindsHat1-2260/+2156
6 dayscheck_cluster: linter fixesRincewindsHat1-3/+5
6 dayscheck_cluster: do not export local symbolsRincewindsHat1-15/+15
6 dayscheck_cluster: Copyright updateRincewindsHat1-2/+2
6 dayscheck_cluster: clang-formatRincewindsHat1-135/+112
6 dayscheck_by_ssh: linter fixesRincewindsHat1-10/+11
6 dayscheck_by_ssh: do not export local symbolsRincewindsHat1-19/+19
6 dayscheck_by_ssh: Copyright updateRincewindsHat1-2/+2
6 dayscheck_by_ssh: clang-formatRincewindsHat1-254/+227
11 dayscheck_ups: clang-format againrefs/pull/2030/headRincewindsHat1-105/+39
2024-10-18check_ups: clang-format againRincewindsHat1-39/+105
2024-10-15check_ups: Update copyrightRincewindsHat1-2/+2
2024-10-15check_ups: clang-formatRincewindsHat1-71/+31
2024-10-10fix check_curl: OpenSSL SSL_read: error:0A000126:SSL routines::unexpected ↵Sven Nierlein1-7/+22
eof while reading, errno 0 using check_curl on a probably embedded device responding as 'Server: GoAhead-Webs' %> check_curl -H ... -S -vvv > GET / HTTP/1.1 Host: ... User-Agent: check_curl/v2.4.0 (monitoring-plugins 2.4.0, libcurl/7.76.1 OpenSSL/3.0.7 zlib/1.2.11 brotli/1.0.9 libidn2/2.3.0 libpsl/0.21.1 (+libidn2/2.3.0) libssh/0.10.4/openssl/zlib nghttp2/1.43.0) Accept: */* Connection: close * Mark bundle as not supporting multiuse * HTTP 1.0, assume close after body < HTTP/1.0 302 Redirect < Server: GoAhead-Webs < Date: Tue Mar 26 17:57:16 2019 < Cache-Control: no-cache, no-store, must-revalidate,private < Pragma: no-cache < Expires: 0 < Content-Type: text/html < X-Frame-Options: sameorigin < X-XSS-Protection: 1; mode=block < X-Content-Type-Options: nosniff < Location: https://... < * OpenSSL SSL_read: error:0A000126:SSL routines::unexpected eof while reading, errno 0 * Closing connection 0 reading the discussion on https://github.com/openssl/openssl/discussions/22690 suggest to set the option SSL_OP_IGNORE_UNEXPECTED_EOF which makes check_curl behave like check_http at this point. Since this is a rather new flag, fencing it in ifdefs. And since there can only be one ssl ctx function, we need to move both tasks into one function.
2024-10-06Merge branch 'master' into check_curl_regex_staterefs/pull/2014/headLorenz Kästle4-139/+122
2024-09-27Merge pull request #2021 from monitoring-plugins/check_disk_static_fixesLorenz Kästle1-49/+34
Check disk static fixes
2024-09-27check_disk: remove unused variables and functionsrefs/pull/2021/headLorenz Kästle1-15/+0
2024-09-27check_disk: Declare global variables staticLorenz Kästle1-37/+37
Variables only used in that specific translation unit should be static to actually communicate that fact. Also allows the compiler to detect unused (global) variables.
2024-09-27check_snmp: Remove unused PP-macrosrefs/pull/2020/headRincewindsHat1-2/+0
2024-09-27check_snmp: Declare most variables as staticRincewindsHat1-78/+78
2024-09-05Merge pull request #2015 from RincewindsHat/fix/check_mysql_variablesLorenz Kästle1-4/+4
check_mysql: * remove unused variables * convert two practical booleans to real `bool`
2024-08-29Remove experimental state from check_curlrefs/pull/2017/headLorenz Kästle1-2/+0
2024-08-28check_mysql: Label some booleans correctlyrefs/pull/2015/headLorenz Kästle1-4/+4
2024-08-28check_mysql: remove unused global variablesLorenz Kästle1-1/+1
2024-08-28Merge pull request #2001 from RincewindsHat/check_snmp_protocoll_documentationLorenz Kästle1-4/+6
Add more documentation to the help page of check_snmp regarding authe…
2024-08-19check_curl: change help for --state-regex again to fix formattingRincewindsHat1-1/+1
2024-08-19check_curl: Parse state-regex option ignoring caseRincewindsHat1-2/+2
Previously the --state-regex option accepted only "critical" and "warning" as values. This commit changes the strcmp there to strcasecmp to be more tolerant regarding the input.
2024-08-19check_curl: Fix help for state regex optionRincewindsHat1-2/+2
The help output of `check-curl` contained a typo, the real option is `state-regex` and not `regex-state` as the help suggests. Also added the two possible options to avoid confusion.
2024-08-16check_curl: Documentation for --certificate, --cookie-jarrefs/pull/2012/headAlvar Penning1-3/+6
From the mere help output for -C / --certificate, I was confused about what its two integer parameters do. Unfortunately, I also missed out on the explaining examples later. Since I like to have basic documentation for each flag, I tried to make the arguments as short as possible. The other fix was one hyphen too many for the --cookie-jar option.
2024-08-11check_curl: raise SSL issue when --continue-after-certificate is usedYannick Martin1-8/+9
This change aims to raise the worst status between the SSL check and the HTTP check. before: check_curl -H www.google.fr -S --continue-after-certificate --certificate 4000,4000 ; echo $? CRITICAL - Certificate '*.google.fr' expires in 74 day(s) (Tue 22 Oct 2024 12:53:52 PM GMT +0000). HTTP OK: HTTP/2 200 - 22807 bytes in 0.076 second response time |time=0.075516s;;;0.000000;10.000000 size=22807B;;;0; 0 after: /usr/lib/nagios/ovh/check_curl -H www.google.fr -S --continue-after-certificate --certificate 4000,4000 ; echo $? CRITICAL - Certificate '*.google.fr' expires in 74 day(s) (Tue 22 Oct 2024 12:53:52 PM GMT +0000). HTTP OK: HTTP/2 200 - 22840 bytes in 0.090 second response time |time=0.090463s;;;0.000000;10.000000 size=22840B;;;0; 2
2024-07-30check_curl: fix relative redirects on non-standard portSven Nierlein3-9/+32
Having a webserver respond with a relative redirect as for ex. in `Location: /path/to.html` check_curl would use the wrong standard http/https port instead of crafting the absolute url using the given scheme/hostname and port. Adding a new test case for this for check_http and check_curl. check_http did it correct already, so no fix necessary there. before: %>./check_curl -H 127.0.0.1 -p 50493 -f follow -u /redirect_rel -s redirected -vvv **** HEADER **** HTTP/1.1 302 Found ... Location: /redirect2 ... * Seen redirect location /redirect2 ** scheme: (null) ** host: (null) ** port: (null) ** path: /redirect2 Redirection to http://127.0.0.1:80/redirect2 fixed: %>./check_curl -H 127.0.0.1 -p 50493 -f follow -u /redirect_rel -s redirected -vvv **** HEADER **** HTTP/1.1 302 Found ... Location: /redirect2 ... * Seen redirect location /redirect2 ** scheme: (null) ** host: (null) ** port: (null) ** path: /redirect2 Redirection to http://127.0.0.1:50493/redirect2 Signed-off-by: Sven Nierlein <sven@nierlein.de>
2024-07-23Merge branch 'master' into check_curl_featuresrefs/pull/2006/headSven Nierlein5-532/+588
2024-07-23check_http: replace www.mozilla.com with monitoring-plugins.orgSven Nierlein2-4/+4
this makes tests more reliable if we test our own sites instead some 3rd party site. Signed-off-by: Sven Nierlein <sven@consol.de>
2024-07-12check_ups: additional alarm conditions (#1961)Lorenz Kästle1-498/+545
* check_ups: * Update copyright * General refactoring * code formatting * Add ALARM state from ups -> Critical * Set some more states to be warnings
2024-05-21Fix typosrefs/pull/2001/headRincewindsHat1-2/+2
2024-05-21Add more documentation to the help page of check_snmp regarding ↵RincewindsHat1-4/+6
authentication and privacy options
2024-04-12Adjust check_swap testsNapsty1-1/+1
2024-04-12Adjust check_swap testsNapsty1-1/+1
2024-04-12Adjust check_swap testsNapsty1-0/+12