diff options
Diffstat (limited to 'infra/libkookie/nixpkgs/pkgs/servers/monitoring/nagios/plugins')
-rw-r--r-- | infra/libkookie/nixpkgs/pkgs/servers/monitoring/nagios/plugins/check_ssl_cert.nix | 36 | ||||
-rw-r--r-- | infra/libkookie/nixpkgs/pkgs/servers/monitoring/nagios/plugins/check_systemd.nix | 36 |
2 files changed, 72 insertions, 0 deletions
diff --git a/infra/libkookie/nixpkgs/pkgs/servers/monitoring/nagios/plugins/check_ssl_cert.nix b/infra/libkookie/nixpkgs/pkgs/servers/monitoring/nagios/plugins/check_ssl_cert.nix new file mode 100644 index 000000000000..35d02a5f9e2c --- /dev/null +++ b/infra/libkookie/nixpkgs/pkgs/servers/monitoring/nagios/plugins/check_ssl_cert.nix @@ -0,0 +1,36 @@ +{ stdenv, fetchFromGitHub, file, openssl, makeWrapper, which, curl, fetchpatch }: + +stdenv.mkDerivation rec { + pname = "check_ssl_cert"; + version = "1.80.0"; + + src = fetchFromGitHub { + owner = "matteocorti"; + repo = "check_ssl_cert"; + rev = "v${version}"; + sha256 = "1jkwii45hynil1jail9gmz4bak066rdi8zfcczicjsa6npbz50w4"; + }; + + patches = [ + # https://github.com/matteocorti/check_ssl_cert/pull/114 + (fetchpatch { + url = "https://github.com/matteocorti/check_ssl_cert/commit/2b7aad583d507a70605dd44d918739a65b267bfd.patch"; + sha256 = "1jk872jgm6k3qc1ks1h3v6p804spjlnxcj2wc8v0hkmwfwiwd2k4"; + }) + ]; + + nativeBuildInputs = [ makeWrapper ]; + + makeFlags = [ "DESTDIR=$(out)/bin" "MANDIR=$(out)/share/man" ]; + + postInstall = '' + wrapProgram $out/bin/check_ssl_cert \ + --prefix PATH : "${stdenv.lib.makeBinPath [ openssl file which curl ]}" + ''; + + meta = with stdenv.lib; { + description = "A Nagios plugin to check the CA and validity of an X.509 certificate"; + license = licenses.gpl3; + platforms = platforms.all; + }; +} diff --git a/infra/libkookie/nixpkgs/pkgs/servers/monitoring/nagios/plugins/check_systemd.nix b/infra/libkookie/nixpkgs/pkgs/servers/monitoring/nagios/plugins/check_systemd.nix new file mode 100644 index 000000000000..06cd0cf9b2d6 --- /dev/null +++ b/infra/libkookie/nixpkgs/pkgs/servers/monitoring/nagios/plugins/check_systemd.nix @@ -0,0 +1,36 @@ +{ fetchFromGitHub, python3Packages, lib }: + +python3Packages.buildPythonApplication rec { + pname = "check_systemd"; + version = "2.2.1"; + + src = fetchFromGitHub { + owner = "Josef-Friedrich"; + repo = pname; + rev = "v${version}"; + sha256 = "04r14dhqzrdndn235dvr6afy4s4g4asynsgvj99cmyq55nah4asn"; + }; + + propagatedBuildInputs = with python3Packages; [ nagiosplugin ]; + + postInstall = '' + # check_systemd is only a broken stub calling check_systemd.py + mv $out/bin/check_systemd{.py,} + ''; + + # the test scripts run ./check_systemd.py and check_systemd. Patch to + # the installed, patchShebanged executable in $out/bin + preCheck = '' + find test -name "*.py" -execdir sed -i "s@./check_systemd.py@$out/bin/check_systemd@" '{}' ";" + export PATH=$PATH:$out/bin + ''; + checkInputs = [ python3Packages.pytestCheckHook ]; + + meta = with lib; { + description = "Nagios / Icinga monitoring plugin to check systemd for failed units"; + inherit (src.meta) homepage; + maintainers = with maintainers; [ symphorien ]; + license = licenses.lgpl2Only; + platforms = platforms.linux; + }; +} |