<feed xmlns='http://www.w3.org/2005/Atom'>
<title>monitoring-plugins/plugins, branch v2.3</title>
<subtitle>Monitoring Plugins
</subtitle>
<id>https://www.monitoring-plugins.org/repositories/monitoring-plugins/atom?h=v2.3</id>
<link rel='self' href='https://www.monitoring-plugins.org/repositories/monitoring-plugins/atom?h=v2.3'/>
<link rel='alternate' type='text/html' href='https://www.monitoring-plugins.org/repositories/monitoring-plugins/'/>
<updated>2020-09-23T15:19:23Z</updated>
<entry>
<title>Merge pull request #1514 from Rasp8e/master</title>
<updated>2020-09-23T15:19:23Z</updated>
<author>
<name>Sven Nierlein</name>
<email>sven@nierlein.de</email>
</author>
<published>2020-09-23T15:19:23Z</published>
<link rel='alternate' type='text/html' href='https://www.monitoring-plugins.org/repositories/monitoring-plugins/commit/?id=739a7bbe7ceacab9809998d9bf06a4460b44c522'/>
<id>urn:sha1:739a7bbe7ceacab9809998d9bf06a4460b44c522</id>
<content type='text'>
Proxy authorization is now kept when using PROXY + CONNECT to HTTPS</content>
</entry>
<entry>
<title>detect unreachable dns service in nslookup output (from bind-utils-9.8.2)</title>
<updated>2020-05-20T21:02:42Z</updated>
<author>
<name>ghciv6</name>
<email>ghciv6@localhost</email>
</author>
<published>2020-05-20T21:02:42Z</published>
<link rel='alternate' type='text/html' href='https://www.monitoring-plugins.org/repositories/monitoring-plugins/commit/?id=905b09c38b6b8b08f0fe4a43b9b118366817bf0f'/>
<id>urn:sha1:905b09c38b6b8b08f0fe4a43b9b118366817bf0f</id>
<content type='text'>
prevent core if error_scan detects an error in a line without ':'
</content>
</entry>
<entry>
<title>check_curl: host_name may be null</title>
<updated>2020-05-18T12:08:45Z</updated>
<author>
<name>Sven Nierlein</name>
<email>sven@nierlein.de</email>
</author>
<published>2020-05-18T12:08:45Z</published>
<link rel='alternate' type='text/html' href='https://www.monitoring-plugins.org/repositories/monitoring-plugins/commit/?id=772fb233b92d4ad5fc87f30a8efee5c9bb295d1d'/>
<id>urn:sha1:772fb233b92d4ad5fc87f30a8efee5c9bb295d1d</id>
<content type='text'>
for example when using like: ./check_curl localhost
</content>
</entry>
<entry>
<title>update test parameter according to check_http</title>
<updated>2020-05-18T12:08:27Z</updated>
<author>
<name>Sven Nierlein</name>
<email>sven@nierlein.de</email>
</author>
<published>2020-05-18T12:08:27Z</published>
<link rel='alternate' type='text/html' href='https://www.monitoring-plugins.org/repositories/monitoring-plugins/commit/?id=7d2582deb36d5bc1dd961be83bedc1e8fc8cb3c7'/>
<id>urn:sha1:7d2582deb36d5bc1dd961be83bedc1e8fc8cb3c7</id>
<content type='text'>
</content>
</entry>
<entry>
<title>check_curl: use CURLOPT_RESOLVE to fix connecting to the right ip</title>
<updated>2020-05-18T11:43:17Z</updated>
<author>
<name>Sven Nierlein</name>
<email>sven@nierlein.de</email>
</author>
<published>2020-05-18T11:43:17Z</published>
<link rel='alternate' type='text/html' href='https://www.monitoring-plugins.org/repositories/monitoring-plugins/commit/?id=84fd9ae893b53c7dfde78845817d4e1c87b7fed5'/>
<id>urn:sha1:84fd9ae893b53c7dfde78845817d4e1c87b7fed5</id>
<content type='text'>
when using ssl, the composed url contains the hostname instead of the specified
ip. So use CURLOPT_RESOLVE to make curl still connect to the ip.
</content>
</entry>
<entry>
<title>check_curl: clean trailing whitespace</title>
<updated>2020-05-18T09:30:34Z</updated>
<author>
<name>Sven Nierlein</name>
<email>sven@nierlein.de</email>
</author>
<published>2020-05-18T09:30:34Z</published>
<link rel='alternate' type='text/html' href='https://www.monitoring-plugins.org/repositories/monitoring-plugins/commit/?id=8a64e47083674a83f6825d6438f96ec21e6f3168'/>
<id>urn:sha1:8a64e47083674a83f6825d6438f96ec21e6f3168</id>
<content type='text'>
</content>
</entry>
<entry>
<title>merge test changes from check_http</title>
<updated>2020-05-15T12:24:18Z</updated>
<author>
<name>Sven Nierlein</name>
<email>sven@nierlein.de</email>
</author>
<published>2020-05-15T09:52:55Z</published>
<link rel='alternate' type='text/html' href='https://www.monitoring-plugins.org/repositories/monitoring-plugins/commit/?id=d54f14a09238fff7b8f4454b59d0adaef446d5c6'/>
<id>urn:sha1:d54f14a09238fff7b8f4454b59d0adaef446d5c6</id>
<content type='text'>
the example certificate has changed since.
</content>
</entry>
<entry>
<title>tests: update expired test certificate</title>
<updated>2020-05-15T12:24:18Z</updated>
<author>
<name>Sven Nierlein</name>
<email>sven@nierlein.de</email>
</author>
<published>2020-05-15T11:33:48Z</published>
<link rel='alternate' type='text/html' href='https://www.monitoring-plugins.org/repositories/monitoring-plugins/commit/?id=072e97d5de3f147aef1eae41222385352fb8df73'/>
<id>urn:sha1:072e97d5de3f147aef1eae41222385352fb8df73</id>
<content type='text'>
the certificate used to test expired http checks is to old to be used
with recent ssl libraries and results in:

&gt; SSL routines:SSL_CTX_use_certificate:ee key too small

unfortunatly the error is only visible when setting $IO::Socket::SSL::DEBUG in
the check_http.t file.
</content>
</entry>
<entry>
<title>Merge branch 'master' into feature_check_curl</title>
<updated>2020-01-09T13:54:12Z</updated>
<author>
<name>Andreas Baumann</name>
<email>mail@andreasbaumann.cc</email>
</author>
<published>2020-01-09T13:54:12Z</published>
<link rel='alternate' type='text/html' href='https://www.monitoring-plugins.org/repositories/monitoring-plugins/commit/?id=adb958849491ea7e0bba4a15896ebd41a0fbff2d'/>
<id>urn:sha1:adb958849491ea7e0bba4a15896ebd41a0fbff2d</id>
<content type='text'>
</content>
</entry>
<entry>
<title>check_tcp: add --sni</title>
<updated>2020-01-07T20:32:15Z</updated>
<author>
<name>Alexander A. Klimov</name>
<email>grandmaster@al2klimov.de</email>
</author>
<published>2020-01-07T19:57:24Z</published>
<link rel='alternate' type='text/html' href='https://www.monitoring-plugins.org/repositories/monitoring-plugins/commit/?id=f53ea7afd8e124690871ebdb79a1432e4dd14488'/>
<id>urn:sha1:f53ea7afd8e124690871ebdb79a1432e4dd14488</id>
<content type='text'>
</content>
</entry>
</feed>
