forked from pool/monitoring-plugins
Enhancements * check_curl: Add an option to verify the peer certificate & host using the system CA's Fixes * check_icmp: fix simple typo, conspicuosly -> conspicuously * check_curl: fixed help, usage and errors for TLS 1.3 * check_curl: fixed a potential buffer overflow in url buffer * check_dns: split multiple IP addresses passed in one -a argument * check_curl: added string_statuscode function for printing HTTP/1.1 and HTTP/2 correctly * check_curl: fix crash if http header contains leading spaces * check_curl: display a specific human-readable error message where possible * check_pgsql: Using snprintf which honors the buffers size and guarantees null termination. * check_snmp: put the "c" (to mark a counter) after the perfdata value * check_http: Increase regexp limit * check_http: make -C obvious * check_curl: Increase regexp limit (to 1024 as in check_http) * check_curl: make -C obvious (from check_http) - refreshed patches: + monitoring-plugins-1.4.6-no_chown.patch + monitoring-plugins-2.1.1-check_logfile.patch + monitoring-plugins-2.2-mariadb_102_build_fix.patch + monitoring-plugins-2.3-check_ntp_perf_absolute.patch + monitoring-plugins-too_few_arguments_for_check_disk.patch + monitoring-plugins-wrong_return_in_check_swap.patch + monitoring-plugins.check_hpjd.c-64bit-portability-issue.patch + monitoring-plugins.check_snmp.arrayaddress.patch - add sha1 checksum file as source OBS-URL: https://build.opensuse.org/package/show/server:monitoring/monitoring-plugins?expand=0&rev=85
29 lines
1.3 KiB
Diff
29 lines
1.3 KiB
Diff
Index: monitoring-plugins-2.3.1/plugins-root/Makefile.am
|
|
===================================================================
|
|
--- monitoring-plugins-2.3.1.orig/plugins-root/Makefile.am
|
|
+++ monitoring-plugins-2.3.1/plugins-root/Makefile.am
|
|
@@ -47,7 +47,6 @@ INSTALL_SUID = \
|
|
echo " $(INSTALL_PROGRAM) $$p $(DESTDIR)$(libexecdir)/$$p"; \
|
|
$(INSTALL_PROGRAM) $$p $(DESTDIR)$(libexecdir)/$$p; \
|
|
echo " chown root $(DESTDIR)$(libexecdir)/$$p"; \
|
|
- chown root $(DESTDIR)$(libexecdir)/$$p; \
|
|
echo " chmod $(setuid_root_mode) $(DESTDIR)$(libexecdir)/$$p"; \
|
|
chmod $(setuid_root_mode) $(DESTDIR)$(libexecdir)/$$p; \
|
|
done
|
|
@@ -66,11 +65,11 @@ install-exec-local: $(noinst_PROGRAMS)
|
|
&& chmod $(setuid_root_mode) $$TMPFILE > /dev/null 2>&1 \
|
|
&& can_create_suid_root_executable=yes; \
|
|
rm -f $$TMPFILE; \
|
|
- if test $$can_create_suid_root_executable = yes; then \
|
|
- $(INSTALL_SUID); \
|
|
- else \
|
|
- echo "WARNING: insufficient access; not installing setuid plugins"; \
|
|
+ $(INSTALL_SUID); \
|
|
+ if test $$can_create_suid_root_executable != yes; then \
|
|
+ echo "WARNING: insufficient access; not installing plugins as setuid"; \
|
|
echo "NOTE: to install setuid plugins, run 'make install-root' as root"; \
|
|
+ echo "NOTE: or fix this in your packaging (like the specfile)"; \
|
|
fi
|
|
|
|
# /* Author Coreutils team sub-citation */
|