diff options
| author | Dirk Mueller <dmueller@suse.com> | 2026-02-16 11:22:39 +0100 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2026-02-16 11:22:39 +0100 |
| commit | 07a249a5d74a980ca78cead569de5351963cc561 (patch) | |
| tree | 020e74baf838d6bf0bd93aaed9cc6e6218fd102c /plugins/check_mrtg.c | |
| parent | 423d0c52674bfa4ec49e4ae8bce645131f657f74 (diff) | |
| download | monitoring-plugins-07a249a5d74a980ca78cead569de5351963cc561.tar.gz | |
Fix typo in enum MP_PARSING_SUCCES(S) (#2233)
Diffstat (limited to 'plugins/check_mrtg.c')
| -rw-r--r-- | plugins/check_mrtg.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/plugins/check_mrtg.c b/plugins/check_mrtg.c index cdc2a035..bb38fcc5 100644 --- a/plugins/check_mrtg.c +++ b/plugins/check_mrtg.c | |||
| @@ -255,7 +255,7 @@ check_mrtg_config_wrapper process_arguments(int argc, char **argv) { | |||
| 255 | break; | 255 | break; |
| 256 | case 'w': /* critical time threshold */ { | 256 | case 'w': /* critical time threshold */ { |
| 257 | mp_range_parsed tmp = mp_parse_range_string(optarg); | 257 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 258 | if (tmp.error != MP_PARSING_SUCCES) { | 258 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 259 | die(STATE_UNKNOWN, "failed to parse warning threshold"); | 259 | die(STATE_UNKNOWN, "failed to parse warning threshold"); |
| 260 | } | 260 | } |
| 261 | result.config.values_threshold = | 261 | result.config.values_threshold = |
| @@ -263,7 +263,7 @@ check_mrtg_config_wrapper process_arguments(int argc, char **argv) { | |||
| 263 | } break; | 263 | } break; |
| 264 | case 'c': /* warning time threshold */ { | 264 | case 'c': /* warning time threshold */ { |
| 265 | mp_range_parsed tmp = mp_parse_range_string(optarg); | 265 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 266 | if (tmp.error != MP_PARSING_SUCCES) { | 266 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 267 | die(STATE_UNKNOWN, "failed to parse critical threshold"); | 267 | die(STATE_UNKNOWN, "failed to parse critical threshold"); |
| 268 | } | 268 | } |
| 269 | result.config.values_threshold = | 269 | result.config.values_threshold = |
| @@ -330,7 +330,7 @@ check_mrtg_config_wrapper process_arguments(int argc, char **argv) { | |||
| 330 | 330 | ||
| 331 | if (argc > option_char && !result.config.values_threshold.warning_is_set) { | 331 | if (argc > option_char && !result.config.values_threshold.warning_is_set) { |
| 332 | mp_range_parsed tmp = mp_parse_range_string(argv[option_char++]); | 332 | mp_range_parsed tmp = mp_parse_range_string(argv[option_char++]); |
| 333 | if (tmp.error != MP_PARSING_SUCCES) { | 333 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 334 | die(STATE_UNKNOWN, "failed to parse warning threshold"); | 334 | die(STATE_UNKNOWN, "failed to parse warning threshold"); |
| 335 | } | 335 | } |
| 336 | result.config.values_threshold = | 336 | result.config.values_threshold = |
| @@ -339,7 +339,7 @@ check_mrtg_config_wrapper process_arguments(int argc, char **argv) { | |||
| 339 | 339 | ||
| 340 | if (argc > option_char && !result.config.values_threshold.critical_is_set) { | 340 | if (argc > option_char && !result.config.values_threshold.critical_is_set) { |
| 341 | mp_range_parsed tmp = mp_parse_range_string(argv[option_char++]); | 341 | mp_range_parsed tmp = mp_parse_range_string(argv[option_char++]); |
| 342 | if (tmp.error != MP_PARSING_SUCCES) { | 342 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 343 | die(STATE_UNKNOWN, "failed to parse critical threshold"); | 343 | die(STATE_UNKNOWN, "failed to parse critical threshold"); |
| 344 | } | 344 | } |
| 345 | result.config.values_threshold = | 345 | result.config.values_threshold = |
