From 07a249a5d74a980ca78cead569de5351963cc561 Mon Sep 17 00:00:00 2001 From: Dirk Mueller Date: Mon, 16 Feb 2026 11:22:39 +0100 Subject: Fix typo in enum MP_PARSING_SUCCES(S) (#2233) --- plugins/check_curl.c | 6 +++--- plugins/check_dbi.c | 4 ++-- plugins/check_disk.c | 4 ++-- plugins/check_ldap.c | 8 ++++---- plugins/check_mrtg.c | 8 ++++---- plugins/check_mysql.c | 4 ++-- plugins/check_mysql_query.c | 4 ++-- plugins/check_ntp_peer.c | 16 ++++++++-------- plugins/check_ntp_time.c | 4 ++-- plugins/check_pgsql.c | 8 ++++---- plugins/check_real.c | 4 ++-- plugins/check_smtp.c | 4 ++-- plugins/check_snmp.d/check_snmp_helpers.c | 4 ++-- plugins/check_users.c | 4 ++-- 14 files changed, 41 insertions(+), 41 deletions(-) (limited to 'plugins') diff --git a/plugins/check_curl.c b/plugins/check_curl.c index 95e45282..d7d68de5 100644 --- a/plugins/check_curl.c +++ b/plugins/check_curl.c @@ -990,7 +990,7 @@ check_curl_config_wrapper process_arguments(int argc, char **argv) { case 'c': /* critical time threshold */ { mp_range_parsed critical_range = mp_parse_range_string(optarg); - if (critical_range.error != MP_PARSING_SUCCES) { + if (critical_range.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical threshold: %s", optarg); } result.config.thlds = mp_thresholds_set_crit(result.config.thlds, critical_range.range); @@ -999,7 +999,7 @@ check_curl_config_wrapper process_arguments(int argc, char **argv) { { mp_range_parsed warning_range = mp_parse_range_string(optarg); - if (warning_range.error != MP_PARSING_SUCCES) { + if (warning_range.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning threshold: %s", optarg); } result.config.thlds = mp_thresholds_set_warn(result.config.thlds, warning_range.range); @@ -1275,7 +1275,7 @@ check_curl_config_wrapper process_arguments(int argc, char **argv) { { mp_range_parsed foo = mp_parse_range_string(optarg); - if (foo.error != MP_PARSING_SUCCES) { + if (foo.error != MP_PARSING_SUCCESS) { die(STATE_CRITICAL, "failed to parse page size limits: %s", optarg); } diff --git a/plugins/check_dbi.c b/plugins/check_dbi.c index 81d92952..dd466d00 100644 --- a/plugins/check_dbi.c +++ b/plugins/check_dbi.c @@ -470,7 +470,7 @@ check_dbi_config_wrapper process_arguments(int argc, char **argv) { case 'c': /* critical range */ { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical threshold"); } result.config.thresholds = mp_thresholds_set_crit(result.config.thresholds, tmp.range); @@ -478,7 +478,7 @@ check_dbi_config_wrapper process_arguments(int argc, char **argv) { } break; case 'w': /* warning range */ { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning threshold"); } result.config.thresholds = mp_thresholds_set_warn(result.config.thresholds, tmp.range); diff --git a/plugins/check_disk.c b/plugins/check_disk.c index e1a2baff..0d941f25 100644 --- a/plugins/check_disk.c +++ b/plugins/check_disk.c @@ -838,7 +838,7 @@ check_disk_config_wrapper process_arguments(int argc, char **argv) { } char *range = argv[index++]; mp_range_parsed tmp = mp_parse_range_string(range); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning threshold"); } @@ -859,7 +859,7 @@ check_disk_config_wrapper process_arguments(int argc, char **argv) { } char *range = argv[index++]; mp_range_parsed tmp = mp_parse_range_string(range); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning threshold"); } diff --git a/plugins/check_ldap.c b/plugins/check_ldap.c index 333dae41..7f8282b4 100644 --- a/plugins/check_ldap.c +++ b/plugins/check_ldap.c @@ -400,7 +400,7 @@ check_ldap_config_wrapper process_arguments(int argc, char **argv) { break; case 'w': { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning connection time threshold"); } result.config.connection_time_threshold = @@ -408,7 +408,7 @@ check_ldap_config_wrapper process_arguments(int argc, char **argv) { } break; case 'c': { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical connection time threshold"); } result.config.connection_time_threshold = @@ -416,7 +416,7 @@ check_ldap_config_wrapper process_arguments(int argc, char **argv) { } break; case 'W': { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse number of entries warning threshold"); } result.config.entries_thresholds = @@ -424,7 +424,7 @@ check_ldap_config_wrapper process_arguments(int argc, char **argv) { } break; case 'C': { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse number of entries critical threshold"); } result.config.entries_thresholds = diff --git a/plugins/check_mrtg.c b/plugins/check_mrtg.c index cdc2a035..bb38fcc5 100644 --- a/plugins/check_mrtg.c +++ b/plugins/check_mrtg.c @@ -255,7 +255,7 @@ check_mrtg_config_wrapper process_arguments(int argc, char **argv) { break; case 'w': /* critical time threshold */ { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning threshold"); } result.config.values_threshold = @@ -263,7 +263,7 @@ check_mrtg_config_wrapper process_arguments(int argc, char **argv) { } break; case 'c': /* warning time threshold */ { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical threshold"); } result.config.values_threshold = @@ -330,7 +330,7 @@ check_mrtg_config_wrapper process_arguments(int argc, char **argv) { if (argc > option_char && !result.config.values_threshold.warning_is_set) { mp_range_parsed tmp = mp_parse_range_string(argv[option_char++]); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning threshold"); } result.config.values_threshold = @@ -339,7 +339,7 @@ check_mrtg_config_wrapper process_arguments(int argc, char **argv) { if (argc > option_char && !result.config.values_threshold.critical_is_set) { mp_range_parsed tmp = mp_parse_range_string(argv[option_char++]); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical threshold"); } result.config.values_threshold = diff --git a/plugins/check_mysql.c b/plugins/check_mysql.c index 26730d4c..15005bf5 100644 --- a/plugins/check_mysql.c +++ b/plugins/check_mysql.c @@ -572,7 +572,7 @@ check_mysql_config_wrapper process_arguments(int argc, char **argv) { break; case 'w': { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning time threshold"); } result.config.replica_thresholds = @@ -580,7 +580,7 @@ check_mysql_config_wrapper process_arguments(int argc, char **argv) { } break; case 'c': { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical time threshold"); } result.config.replica_thresholds = diff --git a/plugins/check_mysql_query.c b/plugins/check_mysql_query.c index ae6cc15d..fc0966d3 100644 --- a/plugins/check_mysql_query.c +++ b/plugins/check_mysql_query.c @@ -277,14 +277,14 @@ check_mysql_query_config_wrapper process_arguments(int argc, char **argv) { break; case 'w': { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning threshold"); } result.config.thresholds = mp_thresholds_set_warn(result.config.thresholds, tmp.range); } break; case 'c': { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical threshold"); } result.config.thresholds = mp_thresholds_set_crit(result.config.thresholds, tmp.range); diff --git a/plugins/check_ntp_peer.c b/plugins/check_ntp_peer.c index 06737a27..b5cfb460 100644 --- a/plugins/check_ntp_peer.c +++ b/plugins/check_ntp_peer.c @@ -548,7 +548,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { break; case 'w': { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning offset threshold"); } @@ -557,7 +557,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { } break; case 'c': { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical offset threshold"); } @@ -567,7 +567,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { case 'W': { result.config.do_stratum = true; mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning stratum threshold"); } @@ -577,7 +577,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { case 'C': { result.config.do_stratum = true; mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical stratum threshold"); } @@ -587,7 +587,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { case 'j': { result.config.do_jitter = true; mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning jitter threshold"); } @@ -597,7 +597,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { case 'k': { result.config.do_jitter = true; mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical jitter threshold"); } @@ -607,7 +607,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { case 'm': { result.config.do_truechimers = true; mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning truechimer threshold"); } @@ -617,7 +617,7 @@ check_ntp_peer_config_wrapper process_arguments(int argc, char **argv) { case 'n': { result.config.do_truechimers = true; mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical truechimer threshold"); } diff --git a/plugins/check_ntp_time.c b/plugins/check_ntp_time.c index 5955d22e..4e3a55db 100644 --- a/plugins/check_ntp_time.c +++ b/plugins/check_ntp_time.c @@ -605,7 +605,7 @@ static check_ntp_time_config_wrapper process_arguments(int argc, char **argv) { break; case 'w': { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning threshold"); } @@ -614,7 +614,7 @@ static check_ntp_time_config_wrapper process_arguments(int argc, char **argv) { } break; case 'c': { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse crit threshold"); } diff --git a/plugins/check_pgsql.c b/plugins/check_pgsql.c index 0ce75e0a..8cbaaeeb 100644 --- a/plugins/check_pgsql.c +++ b/plugins/check_pgsql.c @@ -401,7 +401,7 @@ static check_pgsql_config_wrapper process_arguments(int argc, char **argv) { break; case 'c': /* critical time threshold */ { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical time threshold"); } result.config.time_thresholds = @@ -409,7 +409,7 @@ static check_pgsql_config_wrapper process_arguments(int argc, char **argv) { } break; case 'w': /* warning time threshold */ { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning time threshold"); } result.config.time_thresholds = @@ -417,7 +417,7 @@ static check_pgsql_config_wrapper process_arguments(int argc, char **argv) { } break; case 'C': /* critical query threshold */ { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical query threshold"); } @@ -427,7 +427,7 @@ static check_pgsql_config_wrapper process_arguments(int argc, char **argv) { } break; case 'W': /* warning query threshold */ { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning query threshold"); } result.config.qthresholds = diff --git a/plugins/check_real.c b/plugins/check_real.c index 15c8a20c..b415578f 100644 --- a/plugins/check_real.c +++ b/plugins/check_real.c @@ -409,7 +409,7 @@ check_real_config_wrapper process_arguments(int argc, char **argv) { case 'w': /* warning time threshold */ { mp_range_parsed critical_range = mp_parse_range_string(optarg); - if (critical_range.error != MP_PARSING_SUCCES) { + if (critical_range.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning threshold: %s", optarg); } result.config.time_thresholds = @@ -418,7 +418,7 @@ check_real_config_wrapper process_arguments(int argc, char **argv) { case 'c': /* critical time threshold */ { mp_range_parsed critical_range = mp_parse_range_string(optarg); - if (critical_range.error != MP_PARSING_SUCCES) { + if (critical_range.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical threshold: %s", optarg); } result.config.time_thresholds = diff --git a/plugins/check_smtp.c b/plugins/check_smtp.c index 701af7b0..24883fd8 100644 --- a/plugins/check_smtp.c +++ b/plugins/check_smtp.c @@ -735,7 +735,7 @@ check_smtp_config_wrapper process_arguments(int argc, char **argv) { break; case 'c': /* critical time threshold */ { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse critical time threshold"); } result.config.connection_time = @@ -743,7 +743,7 @@ check_smtp_config_wrapper process_arguments(int argc, char **argv) { } break; case 'w': /* warning time threshold */ { mp_range_parsed tmp = mp_parse_range_string(optarg); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "failed to parse warning time threshold"); } result.config.connection_time = diff --git a/plugins/check_snmp.d/check_snmp_helpers.c b/plugins/check_snmp.d/check_snmp_helpers.c index 2dfc88b5..83e94a34 100644 --- a/plugins/check_snmp.d/check_snmp_helpers.c +++ b/plugins/check_snmp.d/check_snmp_helpers.c @@ -52,7 +52,7 @@ int check_snmp_set_thresholds(const char *threshold_string, check_snmp_test_unit } mp_range_parsed tmp = mp_parse_range_string(ptr); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "Unable to parse critical threshold range: %s", ptr); } @@ -70,7 +70,7 @@ int check_snmp_set_thresholds(const char *threshold_string, check_snmp_test_unit // Single value // only valid for the first test unit mp_range_parsed tmp = mp_parse_range_string(threshold_string); - if (tmp.error != MP_PARSING_SUCCES) { + if (tmp.error != MP_PARSING_SUCCESS) { die(STATE_UNKNOWN, "Unable to parse critical threshold range: %s", threshold_string); } diff --git a/plugins/check_users.c b/plugins/check_users.c index 3b2e265e..4027d21a 100644 --- a/plugins/check_users.c +++ b/plugins/check_users.c @@ -222,7 +222,7 @@ check_users_config_wrapper process_arguments(int argc, char **argv) { exit(STATE_UNKNOWN); } - if (tmp.error == MP_PARSING_SUCCES) { + if (tmp.error == MP_PARSING_SUCCESS) { result.config.thresholds.warning = tmp.range; result.config.thresholds.warning_is_set = true; } else { @@ -238,7 +238,7 @@ check_users_config_wrapper process_arguments(int argc, char **argv) { exit(STATE_UNKNOWN); } - if (tmp.error == MP_PARSING_SUCCES) { + if (tmp.error == MP_PARSING_SUCCESS) { result.config.thresholds.critical = tmp.range; result.config.thresholds.critical_is_set = true; } else { -- cgit v1.2.3-74-g34f1