Displaying 16 results from an estimated 16 matches similar to: "[PATCH 3/3] Fix pointer check on wrong variable"
2010 Mar 25
1
new TSSHARA SOHO II ups
Hi all, My name is Sergio Penen and I'd like to contribute to the project by
developing a new driver for TS SHARA SOHO II usb ups.
I'm almost done decoding the protocol and already have some basic
functionality working with NUT. However I've some doubts on how to integrate
this driver with NUT and I wonder if you could give me some guidance in that
sense. To be more specific: In order
2020 Apr 03
0
Powercool PCRACK-1200VA patch update
Sorry about the noise guys.
Below a significantly improved patch.
The main difference is that all calls to usb_get_string_.. have been
wrapped in a new function nut_usb_get_string() that is implemented in
libusb.c
This was necessary in order to make the bufflen_fix available in
libusb.c where usb_get_string() is called in libusb_open()
This wrapper function mops up and hides all the work
2020 Apr 03
0
Patch to support Powercool PCRACK-1200VA
Hi Folks,
This is my first post on nut-upsdev.
I would like to share a small patch to enable support for the Powercool
PCRACK 1200VA ups.
I found that the UPS uses megatec/krauler protocol but is sensitive to
the USB buffer length passed to it in requests via usb_get_string(), and
usb_get_string_simple().
If the buflen is greater than 102 then the ups will reply to requests
but does not
2010 Apr 19
2
Too much logging from libusb.c (patch supplied)
I recently installed NUT 2.4.3 and found that the USB drivers were logging
an insane amount of data to syslog:
usbhid-ups | daemon debug | Apr 16 18:29:40 | libusb_get_report: No error
usbhid-ups | daemon debug | Apr 16 18:29:40 | libusb_get_report: No error
usbhid-ups | daemon debug | Apr 16 18:29:40 | libusb_get_report: No error
usbhid-ups | daemon debug | Apr 16 18:29:40 |
2014 Aug 09
0
Cyberpower Value1200E might not need 0.667 battery scaling
On Aug 8, 2014, at 9:15 AM, Charles Lepple <clepple at gmail.com> wrote:
> On Aug 7, 2014, at 10:52 PM, Charles Lepple <clepple at gmail.com> wrote:
>
>> On Aug 7, 2014, at 10:18 PM, Matthew Stapleton <matthew4196 at gmail.com> wrote:
>>
>>> I just got a Cyberpower SOHO Value 1200 ELCD UPS and even with nut 2.7.2, it appears to report battery voltage
2014 Aug 08
2
Cyberpower Value1200E might not need 0.667 battery scaling
On Aug 7, 2014, at 10:52 PM, Charles Lepple <clepple at gmail.com> wrote:
> On Aug 7, 2014, at 10:18 PM, Matthew Stapleton <matthew4196 at gmail.com> wrote:
>
>> I just got a Cyberpower SOHO Value 1200 ELCD UPS and even with nut 2.7.2, it appears to report battery voltage too low due to the battery scaling function (In drivers/cps-hid.c). Even though the ups has usb id:
2014 Aug 11
1
Cyberpower Value1200E might not need 0.667 battery scaling
Attached is the first 32 seconds of the driver output after applying the
patch which fixes the battery scaling problem for this UPS.
Matthew Stapleton
Email: matthew4196 at gmail.com
On 10/08/14 01:27, Charles Lepple wrote:
> On Aug 8, 2014, at 9:15 AM, Charles Lepple <clepple at gmail.com> wrote:
>
>> On Aug 7, 2014, at 10:52 PM, Charles Lepple <clepple at gmail.com>
2011 Jan 07
1
[nut-commits] svn commit r2809 - branches/ssl-nss-port/server
Citeren Emilien Kia <emilienkia-guest op alioth.debian.org>:
> Author: emilienkia-guest
> Date: Fri Jan 7 14:44:25 2011
> New Revision: 2809
> URL: http://trac.networkupstools.org/projects/nut/changeset/2809
>
> Log:
> Deprecate CERTFILE conf var to the benefit of CERTPATH : homogenize
> conf directive names.
>
> Modified:
>
2011 Jan 07
2
[nut-commits] svn commit r2804 - in branches/ssl-nss-port: clients server
Citeren Emilien Kia <emilienkia-guest op alioth.debian.org>:
> Modified: branches/ssl-nss-port/server/conf.c
> ==============================================================================
> --- branches/ssl-nss-port/server/conf.c Wed Jan 5 21:12:03 2011 (r2803)
> +++ branches/ssl-nss-port/server/conf.c Thu Jan 6 10:27:55 2011 (r2804)
> @@ -178,6 +178,22 @@
> return
2011 Aug 27
1
[PATCH 2/3] Fix use of uninitialized variable
Credit goes to "cppcheck".
Signed-off-by: Thomas Jarosch <thomas.jarosch at intra2net.com>
---
drivers/mge-utalk.c | 3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/drivers/mge-utalk.c b/drivers/mge-utalk.c
index c6114c7..616e2ad 100644
--- a/drivers/mge-utalk.c
+++ b/drivers/mge-utalk.c
@@ -465,7 +465,8 @@ void upsdrv_shutdown(void)
{
char
2011 Aug 27
1
[PATCH 1/3] Fix file descriptor leak
Credit goes to "cppcheck"
Signed-off-by: Thomas Jarosch <thomas.jarosch at intra2net.com>
---
common/common.c | 5 +++++
1 files changed, 5 insertions(+), 0 deletions(-)
diff --git a/common/common.c b/common/common.c
index f443cb7..e8004d7 100644
--- a/common/common.c
+++ b/common/common.c
@@ -244,6 +244,7 @@ int sendsignalfn(const char *pidfn, int sig)
if (fgets(buf,
2011 Jan 11
1
Client certificates
While browsing the sources of the nss-ssl-port sources I noticed that
client certificates were added. What is the reason behind this? As far
as I can see, using a server certificate and validating it in the
upsmon client should provide us with a secure channel. Authorizations
for the server will then be handled by the settings in upsd.users by
logging into the server with user and
2011 Jul 06
4
upsclient high level API and Java wrapping
Hi all,
on proposal by Arnaud Quette and sponsored by Eaton, I will work on a port on Java of client, discovery and config API.
As I have already suggested (mail of 2011-06-14 of this ml), instead of developping another port of nut protocol, I suggest to develop a higher level API in C/C++ uppon existing upsclient, inspirated by existing C-based tools and python and perl rewrites.
The second
2011 Jan 21
1
End of NSS port
Hi all,
I am pleased to announce that NSS port of NUT is finished.
Port is fully functionnal (same functionnalities as openssl, and a
not-activated-by-default client certificate validation function) and
successfully tested by myself (external tests are pending, Frederic Bohe
is planned for) with a test matrix which will be uploaded to the web
site soon (by Arnaud), tested functionnality by
2011 Jan 13
1
SSL certificate verification with OpenSSL in NUT trunk
Hi all,
After client's certificate verifications discussion in the mailing-list,
I have done some tests with nut trunk and - if my config is not too bad
- I think ther is a bug with server certificate verification.
With a clean trunk checkout, compile and installation; and with the
following config :
upsmon.conf:
CERTPATH /usr/local/ups/etc/cert/
CERTVERIFY 1
FORCESSL 1
Upsd.conf:
CERTFILE
2013 May 09
1
equivalent way to iterate through a hash
If I have something like this in my node file:
daemontools_service::setup {
''carbon-cache'':
service_name => ''carbon-cache'',
....
extra_envs => {
"GRAPHITE_STORAGE_DIR" => "/mnt/statsd-data/graphite-storage"
"SOMETHING_ELSE" =>