diff options
Diffstat (limited to 'plugins')
| -rw-r--r-- | plugins/check_apt.c | 6 | ||||
| -rw-r--r-- | plugins/check_nt.c | 16 | ||||
| -rw-r--r-- | plugins/check_ntp_peer.c | 32 | ||||
| -rw-r--r-- | plugins/check_smtp.c | 26 |
4 files changed, 48 insertions, 32 deletions
diff --git a/plugins/check_apt.c b/plugins/check_apt.c index 7ec2d55a..433055b5 100644 --- a/plugins/check_apt.c +++ b/plugins/check_apt.c | |||
| @@ -116,7 +116,7 @@ int main (int argc, char **argv) { | |||
| 116 | result = max_state(result, STATE_OK); | 116 | result = max_state(result, STATE_OK); |
| 117 | } | 117 | } |
| 118 | 118 | ||
| 119 | printf(_("APT %s: %d packages available for %s (%d critical updates). %s%s%s%s\n"), | 119 | printf(_("APT %s: %d packages available for %s (%d critical updates). %s%s%s%s|available_upgrades=%d;;;0 critical_updates=%d;;;0\n"), |
| 120 | state_text(result), | 120 | state_text(result), |
| 121 | packages_available, | 121 | packages_available, |
| 122 | (upgrade==DIST_UPGRADE)?"dist-upgrade":"upgrade", | 122 | (upgrade==DIST_UPGRADE)?"dist-upgrade":"upgrade", |
| @@ -124,7 +124,9 @@ int main (int argc, char **argv) { | |||
| 124 | (stderr_warning)?" warnings detected":"", | 124 | (stderr_warning)?" warnings detected":"", |
| 125 | (stderr_warning && exec_warning)?",":"", | 125 | (stderr_warning && exec_warning)?",":"", |
| 126 | (exec_warning)?" errors detected":"", | 126 | (exec_warning)?" errors detected":"", |
| 127 | (stderr_warning||exec_warning)?". run with -v for information.":"" | 127 | (stderr_warning||exec_warning)?". run with -v for information.":"", |
| 128 | packages_available, | ||
| 129 | sec_count | ||
| 128 | ); | 130 | ); |
| 129 | 131 | ||
| 130 | return result; | 132 | return result; |
diff --git a/plugins/check_nt.c b/plugins/check_nt.c index 89c4d8d3..52bbd1c5 100644 --- a/plugins/check_nt.c +++ b/plugins/check_nt.c | |||
| @@ -94,6 +94,7 @@ int main(int argc, char **argv){ | |||
| 94 | char *description=NULL,*counter_unit = NULL; | 94 | char *description=NULL,*counter_unit = NULL; |
| 95 | char *minval = NULL, *maxval = NULL, *errcvt = NULL; | 95 | char *minval = NULL, *maxval = NULL, *errcvt = NULL; |
| 96 | char *fds=NULL, *tds=NULL; | 96 | char *fds=NULL, *tds=NULL; |
| 97 | char *numstr; | ||
| 97 | 98 | ||
| 98 | double total_disk_space=0; | 99 | double total_disk_space=0; |
| 99 | double free_disk_space=0; | 100 | double free_disk_space=0; |
| @@ -265,7 +266,10 @@ int main(int argc, char **argv){ | |||
| 265 | xasprintf(&send_buffer,"%s&%u&%s&%s", req_password,(vars_to_check==CHECK_SERVICESTATE)?5:6, | 266 | xasprintf(&send_buffer,"%s&%u&%s&%s", req_password,(vars_to_check==CHECK_SERVICESTATE)?5:6, |
| 266 | (show_all==TRUE) ? "ShowAll" : "ShowFail",value_list); | 267 | (show_all==TRUE) ? "ShowAll" : "ShowFail",value_list); |
| 267 | fetch_data (server_address, server_port, send_buffer); | 268 | fetch_data (server_address, server_port, send_buffer); |
| 268 | return_code=atoi(strtok(recv_buffer,"&")); | 269 | numstr = strtok(recv_buffer,"&"); |
| 270 | if (numstr == NULL) | ||
| 271 | die(STATE_UNKNOWN, _("could not fetch information from server\n")); | ||
| 272 | return_code=atoi(numstr); | ||
| 269 | temp_string=strtok(NULL,"&"); | 273 | temp_string=strtok(NULL,"&"); |
| 270 | output_message = strdup (temp_string); | 274 | output_message = strdup (temp_string); |
| 271 | } | 275 | } |
| @@ -275,8 +279,14 @@ int main(int argc, char **argv){ | |||
| 275 | 279 | ||
| 276 | xasprintf(&send_buffer,"%s&7", req_password); | 280 | xasprintf(&send_buffer,"%s&7", req_password); |
| 277 | fetch_data (server_address, server_port, send_buffer); | 281 | fetch_data (server_address, server_port, send_buffer); |
| 278 | mem_commitLimit=atof(strtok(recv_buffer,"&")); | 282 | numstr = strtok(recv_buffer,"&"); |
| 279 | mem_commitByte=atof(strtok(NULL,"&")); | 283 | if (numstr == NULL) |
| 284 | die(STATE_UNKNOWN, _("could not fetch information from server\n")); | ||
| 285 | mem_commitLimit=atof(numstr); | ||
| 286 | numstr = strtok(NULL,"&"); | ||
| 287 | if (numstr == NULL) | ||
| 288 | die(STATE_UNKNOWN, _("could not fetch information from server\n")); | ||
| 289 | mem_commitByte=atof(numstr); | ||
| 280 | percent_used_space = (mem_commitByte / mem_commitLimit) * 100; | 290 | percent_used_space = (mem_commitByte / mem_commitLimit) * 100; |
| 281 | warning_used_space = ((float)warning_value / 100) * mem_commitLimit; | 291 | warning_used_space = ((float)warning_value / 100) * mem_commitLimit; |
| 282 | critical_used_space = ((float)critical_value / 100) * mem_commitLimit; | 292 | critical_used_space = ((float)critical_value / 100) * mem_commitLimit; |
diff --git a/plugins/check_ntp_peer.c b/plugins/check_ntp_peer.c index b59c056d..76152e17 100644 --- a/plugins/check_ntp_peer.c +++ b/plugins/check_ntp_peer.c | |||
| @@ -241,15 +241,19 @@ int ntp_request(const char *host, double *offset, int *offset_result, double *ji | |||
| 241 | DBG(printf("sending READSTAT request")); | 241 | DBG(printf("sending READSTAT request")); |
| 242 | write(conn, &req, SIZEOF_NTPCM(req)); | 242 | write(conn, &req, SIZEOF_NTPCM(req)); |
| 243 | DBG(print_ntp_control_message(&req)); | 243 | DBG(print_ntp_control_message(&req)); |
| 244 | /* Attempt to read the largest size packet possible */ | 244 | |
| 245 | req.count=htons(MAX_CM_SIZE); | 245 | do { |
| 246 | DBG(printf("recieving READSTAT response")) | 246 | /* Attempt to read the largest size packet possible */ |
| 247 | if(read(conn, &req, SIZEOF_NTPCM(req)) == -1) | 247 | req.count=htons(MAX_CM_SIZE); |
| 248 | die(STATE_CRITICAL, "NTP CRITICAL: No response from NTP server\n"); | 248 | DBG(printf("recieving READSTAT response")) |
| 249 | DBG(print_ntp_control_message(&req)); | 249 | if(read(conn, &req, SIZEOF_NTPCM(req)) == -1) |
| 250 | /* discard obviously invalid packets */ | 250 | die(STATE_CRITICAL, "NTP CRITICAL: No response from NTP server\n"); |
| 251 | if (ntohs(req.count) > MAX_CM_SIZE) | 251 | DBG(print_ntp_control_message(&req)); |
| 252 | die(STATE_CRITICAL, "NTP CRITICAL: Invalid packet received from NTP server\n"); | 252 | /* discard obviously invalid packets */ |
| 253 | if (ntohs(req.count) > MAX_CM_SIZE) | ||
| 254 | die(STATE_CRITICAL, "NTP CRITICAL: Invalid packet received from NTP server\n"); | ||
| 255 | } while (!(req.op&OP_READSTAT && ntohs(req.seq) == 1)); | ||
| 256 | |||
| 253 | if (LI(req.flags) == LI_ALARM) li_alarm = 1; | 257 | if (LI(req.flags) == LI_ALARM) li_alarm = 1; |
| 254 | /* Each peer identifier is 4 bytes in the data section, which | 258 | /* Each peer identifier is 4 bytes in the data section, which |
| 255 | * we represent as a ntp_assoc_status_pair datatype. | 259 | * we represent as a ntp_assoc_status_pair datatype. |
| @@ -312,10 +316,12 @@ int ntp_request(const char *host, double *offset, int *offset_result, double *ji | |||
| 312 | write(conn, &req, SIZEOF_NTPCM(req)); | 316 | write(conn, &req, SIZEOF_NTPCM(req)); |
| 313 | DBG(print_ntp_control_message(&req)); | 317 | DBG(print_ntp_control_message(&req)); |
| 314 | 318 | ||
| 315 | req.count = htons(MAX_CM_SIZE); | 319 | do { |
| 316 | DBG(printf("receiving READVAR response...\n")); | 320 | req.count = htons(MAX_CM_SIZE); |
| 317 | read(conn, &req, SIZEOF_NTPCM(req)); | 321 | DBG(printf("receiving READVAR response...\n")); |
| 318 | DBG(print_ntp_control_message(&req)); | 322 | read(conn, &req, SIZEOF_NTPCM(req)); |
| 323 | DBG(print_ntp_control_message(&req)); | ||
| 324 | } while (!(req.op&OP_READVAR && ntohs(req.seq) == 2)); | ||
| 319 | 325 | ||
| 320 | if(!(req.op&REM_ERROR)) | 326 | if(!(req.op&REM_ERROR)) |
| 321 | xasprintf(&data, "%s%s", data, req.data); | 327 | xasprintf(&data, "%s%s", data, req.data); |
diff --git a/plugins/check_smtp.c b/plugins/check_smtp.c index 79fa4824..d477a51e 100644 --- a/plugins/check_smtp.c +++ b/plugins/check_smtp.c | |||
| @@ -99,9 +99,9 @@ char **responses = NULL; | |||
| 99 | char *authtype = NULL; | 99 | char *authtype = NULL; |
| 100 | char *authuser = NULL; | 100 | char *authuser = NULL; |
| 101 | char *authpass = NULL; | 101 | char *authpass = NULL; |
| 102 | int warning_time = 0; | 102 | double warning_time = 0; |
| 103 | int check_warning_time = FALSE; | 103 | int check_warning_time = FALSE; |
| 104 | int critical_time = 0; | 104 | double critical_time = 0; |
| 105 | int check_critical_time = FALSE; | 105 | int check_critical_time = FALSE; |
| 106 | int verbose = 0; | 106 | int verbose = 0; |
| 107 | int use_ssl = FALSE; | 107 | int use_ssl = FALSE; |
| @@ -417,9 +417,9 @@ main (int argc, char **argv) | |||
| 417 | elapsed_time = (double)microsec / 1.0e6; | 417 | elapsed_time = (double)microsec / 1.0e6; |
| 418 | 418 | ||
| 419 | if (result == STATE_OK) { | 419 | if (result == STATE_OK) { |
| 420 | if (check_critical_time && elapsed_time > (double) critical_time) | 420 | if (check_critical_time && elapsed_time > critical_time) |
| 421 | result = STATE_CRITICAL; | 421 | result = STATE_CRITICAL; |
| 422 | else if (check_warning_time && elapsed_time > (double) warning_time) | 422 | else if (check_warning_time && elapsed_time > warning_time) |
| 423 | result = STATE_WARNING; | 423 | result = STATE_WARNING; |
| 424 | } | 424 | } |
| 425 | 425 | ||
| @@ -552,21 +552,19 @@ process_arguments (int argc, char **argv) | |||
| 552 | nresponses++; | 552 | nresponses++; |
| 553 | break; | 553 | break; |
| 554 | case 'c': /* critical time threshold */ | 554 | case 'c': /* critical time threshold */ |
| 555 | if (is_intnonneg (optarg)) { | 555 | if (!is_nonnegative (optarg)) |
| 556 | critical_time = atoi (optarg); | 556 | usage4 (_("Critical time must be a positive")); |
| 557 | check_critical_time = TRUE; | ||
| 558 | } | ||
| 559 | else { | 557 | else { |
| 560 | usage4 (_("Critical time must be a positive integer")); | 558 | critical_time = strtod (optarg, NULL); |
| 559 | check_critical_time = TRUE; | ||
| 561 | } | 560 | } |
| 562 | break; | 561 | break; |
| 563 | case 'w': /* warning time threshold */ | 562 | case 'w': /* warning time threshold */ |
| 564 | if (is_intnonneg (optarg)) { | 563 | if (!is_nonnegative (optarg)) |
| 565 | warning_time = atoi (optarg); | 564 | usage4 (_("Warning time must be a positive")); |
| 566 | check_warning_time = TRUE; | ||
| 567 | } | ||
| 568 | else { | 565 | else { |
| 569 | usage4 (_("Warning time must be a positive integer")); | 566 | warning_time = strtod (optarg, NULL); |
| 567 | check_warning_time = TRUE; | ||
| 570 | } | 568 | } |
| 571 | break; | 569 | break; |
| 572 | case 'v': /* verbose */ | 570 | case 'v': /* verbose */ |
