diff options
| author | Dirk Mueller <dmueller@suse.com> | 2026-02-16 11:22:39 +0100 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2026-02-16 11:22:39 +0100 |
| commit | 07a249a5d74a980ca78cead569de5351963cc561 (patch) | |
| tree | 020e74baf838d6bf0bd93aaed9cc6e6218fd102c /plugins/check_ntp_peer.c | |
| parent | 423d0c52674bfa4ec49e4ae8bce645131f657f74 (diff) | |
| download | monitoring-plugins-07a249a5d74a980ca78cead569de5351963cc561.tar.gz | |
Fix typo in enum MP_PARSING_SUCCES(S) (#2233)
Diffstat (limited to 'plugins/check_ntp_peer.c')
| -rw-r--r-- | plugins/check_ntp_peer.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/plugins/check_ntp_peer.c b/plugins/check_ntp_peer.c index 06737a27..b5cfb460 100644 --- a/plugins/check_ntp_peer.c +++ b/plugins/check_ntp_peer.c | |||
| @@ -548,7 +548,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { | |||
| 548 | break; | 548 | break; |
| 549 | case 'w': { | 549 | case 'w': { |
| 550 | mp_range_parsed tmp = mp_parse_range_string(optarg); | 550 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 551 | if (tmp.error != MP_PARSING_SUCCES) { | 551 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 552 | die(STATE_UNKNOWN, "failed to parse warning offset threshold"); | 552 | die(STATE_UNKNOWN, "failed to parse warning offset threshold"); |
| 553 | } | 553 | } |
| 554 | 554 | ||
| @@ -557,7 +557,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { | |||
| 557 | } break; | 557 | } break; |
| 558 | case 'c': { | 558 | case 'c': { |
| 559 | mp_range_parsed tmp = mp_parse_range_string(optarg); | 559 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 560 | if (tmp.error != MP_PARSING_SUCCES) { | 560 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 561 | die(STATE_UNKNOWN, "failed to parse critical offset threshold"); | 561 | die(STATE_UNKNOWN, "failed to parse critical offset threshold"); |
| 562 | } | 562 | } |
| 563 | 563 | ||
| @@ -567,7 +567,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { | |||
| 567 | case 'W': { | 567 | case 'W': { |
| 568 | result.config.do_stratum = true; | 568 | result.config.do_stratum = true; |
| 569 | mp_range_parsed tmp = mp_parse_range_string(optarg); | 569 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 570 | if (tmp.error != MP_PARSING_SUCCES) { | 570 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 571 | die(STATE_UNKNOWN, "failed to parse warning stratum threshold"); | 571 | die(STATE_UNKNOWN, "failed to parse warning stratum threshold"); |
| 572 | } | 572 | } |
| 573 | 573 | ||
| @@ -577,7 +577,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { | |||
| 577 | case 'C': { | 577 | case 'C': { |
| 578 | result.config.do_stratum = true; | 578 | result.config.do_stratum = true; |
| 579 | mp_range_parsed tmp = mp_parse_range_string(optarg); | 579 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 580 | if (tmp.error != MP_PARSING_SUCCES) { | 580 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 581 | die(STATE_UNKNOWN, "failed to parse critical stratum threshold"); | 581 | die(STATE_UNKNOWN, "failed to parse critical stratum threshold"); |
| 582 | } | 582 | } |
| 583 | 583 | ||
| @@ -587,7 +587,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { | |||
| 587 | case 'j': { | 587 | case 'j': { |
| 588 | result.config.do_jitter = true; | 588 | result.config.do_jitter = true; |
| 589 | mp_range_parsed tmp = mp_parse_range_string(optarg); | 589 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 590 | if (tmp.error != MP_PARSING_SUCCES) { | 590 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 591 | die(STATE_UNKNOWN, "failed to parse warning jitter threshold"); | 591 | die(STATE_UNKNOWN, "failed to parse warning jitter threshold"); |
| 592 | } | 592 | } |
| 593 | 593 | ||
| @@ -597,7 +597,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { | |||
| 597 | case 'k': { | 597 | case 'k': { |
| 598 | result.config.do_jitter = true; | 598 | result.config.do_jitter = true; |
| 599 | mp_range_parsed tmp = mp_parse_range_string(optarg); | 599 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 600 | if (tmp.error != MP_PARSING_SUCCES) { | 600 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 601 | die(STATE_UNKNOWN, "failed to parse critical jitter threshold"); | 601 | die(STATE_UNKNOWN, "failed to parse critical jitter threshold"); |
| 602 | } | 602 | } |
| 603 | 603 | ||
| @@ -607,7 +607,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { | |||
| 607 | case 'm': { | 607 | case 'm': { |
| 608 | result.config.do_truechimers = true; | 608 | result.config.do_truechimers = true; |
| 609 | mp_range_parsed tmp = mp_parse_range_string(optarg); | 609 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 610 | if (tmp.error != MP_PARSING_SUCCES) { | 610 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 611 | die(STATE_UNKNOWN, "failed to parse warning truechimer threshold"); | 611 | die(STATE_UNKNOWN, "failed to parse warning truechimer threshold"); |
| 612 | } | 612 | } |
| 613 | 613 | ||
| @@ -617,7 +617,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { | |||
| 617 | case 'n': { | 617 | case 'n': { |
| 618 | result.config.do_truechimers = true; | 618 | result.config.do_truechimers = true; |
| 619 | mp_range_parsed tmp = mp_parse_range_string(optarg); | 619 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 620 | if (tmp.error != MP_PARSING_SUCCES) { | 620 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 621 | die(STATE_UNKNOWN, "failed to parse critical truechimer threshold"); | 621 | die(STATE_UNKNOWN, "failed to parse critical truechimer threshold"); |
| 622 | } | 622 | } |
| 623 | 623 | ||
