diff options
| author | Dirk Mueller <dmueller@suse.com> | 2026-02-16 11:22:39 +0100 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2026-02-16 11:22:39 +0100 |
| commit | 07a249a5d74a980ca78cead569de5351963cc561 (patch) | |
| tree | 020e74baf838d6bf0bd93aaed9cc6e6218fd102c /plugins/check_pgsql.c | |
| parent | 423d0c52674bfa4ec49e4ae8bce645131f657f74 (diff) | |
| download | monitoring-plugins-07a249a5d74a980ca78cead569de5351963cc561.tar.gz | |
Fix typo in enum MP_PARSING_SUCCES(S) (#2233)
Diffstat (limited to 'plugins/check_pgsql.c')
| -rw-r--r-- | plugins/check_pgsql.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/plugins/check_pgsql.c b/plugins/check_pgsql.c index 0ce75e0a..8cbaaeeb 100644 --- a/plugins/check_pgsql.c +++ b/plugins/check_pgsql.c | |||
| @@ -401,7 +401,7 @@ static check_pgsql_config_wrapper process_arguments(int argc, char **argv) { | |||
| 401 | break; | 401 | break; |
| 402 | case 'c': /* critical time threshold */ { | 402 | case 'c': /* critical time threshold */ { |
| 403 | mp_range_parsed tmp = mp_parse_range_string(optarg); | 403 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 404 | if (tmp.error != MP_PARSING_SUCCES) { | 404 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 405 | die(STATE_UNKNOWN, "failed to parse critical time threshold"); | 405 | die(STATE_UNKNOWN, "failed to parse critical time threshold"); |
| 406 | } | 406 | } |
| 407 | result.config.time_thresholds = | 407 | result.config.time_thresholds = |
| @@ -409,7 +409,7 @@ static check_pgsql_config_wrapper process_arguments(int argc, char **argv) { | |||
| 409 | } break; | 409 | } break; |
| 410 | case 'w': /* warning time threshold */ { | 410 | case 'w': /* warning time threshold */ { |
| 411 | mp_range_parsed tmp = mp_parse_range_string(optarg); | 411 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 412 | if (tmp.error != MP_PARSING_SUCCES) { | 412 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 413 | die(STATE_UNKNOWN, "failed to parse warning time threshold"); | 413 | die(STATE_UNKNOWN, "failed to parse warning time threshold"); |
| 414 | } | 414 | } |
| 415 | result.config.time_thresholds = | 415 | result.config.time_thresholds = |
| @@ -417,7 +417,7 @@ static check_pgsql_config_wrapper process_arguments(int argc, char **argv) { | |||
| 417 | } break; | 417 | } break; |
| 418 | case 'C': /* critical query threshold */ { | 418 | case 'C': /* critical query threshold */ { |
| 419 | mp_range_parsed tmp = mp_parse_range_string(optarg); | 419 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 420 | if (tmp.error != MP_PARSING_SUCCES) { | 420 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 421 | die(STATE_UNKNOWN, "failed to parse critical query threshold"); | 421 | die(STATE_UNKNOWN, "failed to parse critical query threshold"); |
| 422 | } | 422 | } |
| 423 | 423 | ||
| @@ -427,7 +427,7 @@ static check_pgsql_config_wrapper process_arguments(int argc, char **argv) { | |||
| 427 | } break; | 427 | } break; |
| 428 | case 'W': /* warning query threshold */ { | 428 | case 'W': /* warning query threshold */ { |
| 429 | mp_range_parsed tmp = mp_parse_range_string(optarg); | 429 | mp_range_parsed tmp = mp_parse_range_string(optarg); |
| 430 | if (tmp.error != MP_PARSING_SUCCES) { | 430 | if (tmp.error != MP_PARSING_SUCCESS) { |
| 431 | die(STATE_UNKNOWN, "failed to parse warning query threshold"); | 431 | die(STATE_UNKNOWN, "failed to parse warning query threshold"); |
| 432 | } | 432 | } |
| 433 | result.config.qthresholds = | 433 | result.config.qthresholds = |
