#!/usr/bin/python
# -*- encoding: utf-8; py-indent-offset: 4 -*-
# +------------------------------------------------------------------+
# |             ____ _               _        __  __ _  __           |
# |            / ___| |__   ___  ___| | __   |  \/  | |/ /           |
# |           | |   | '_ \ / _ \/ __| |/ /   | |\/| | ' /            |
# |           | |___| | | |  __/ (__|   <    | |  | | . \            |
# |            \____|_| |_|\___|\___|_|\_\___|_|  |_|_|\_\           |
# |                                                                  |
# | Copyright Mathias Kettner 2015             mk@mathias-kettner.de |
# +------------------------------------------------------------------+
#
# This file is part of Check_MK.
# The official homepage is at http://mathias-kettner.de/check_mk.
#
# check_mk is free software;  you can redistribute it and/or modify it
# under the  terms of the  GNU General Public License  as published by
# the Free Software Foundation in version 2.  check_mk is  distributed
# in the hope that it will be useful, but WITHOUT ANY WARRANTY;  with-
# out even the implied warranty of  MERCHANTABILITY  or  FITNESS FOR A
# PARTICULAR PURPOSE. See the  GNU General Public License for more de-
# tails. You should have  received  a copy of the  GNU  General Public
# License along with GNU Make; see the file  COPYING.  If  not,  write
# to the Free Software Foundation, Inc., 51 Franklin St,  Fifth Floor,
# Boston, MA 02110-1301 USA.

factory_settings['fortigate_ipsecvpn_default_levels'] = {
    "levels": (1, 2),
}


def inventory_fortigate_ipsecvpn(info):
    if len(info) > 0:
        return [(None, {})]


def check_fortigate_ipsecvpn(item, params, info):
    if isinstance(params, tuple):
        params = {"levels": params}

    tunnels_ignore_levels = params.get("tunnels_ignore_levels", [])

    tunnels_down = set()
    tunnels_ignored = set()
    for p2name, ent_status in info:
        if ent_status == "1":  # down(1), up(2)
            tunnels_down.add(p2name)
            if p2name in tunnels_ignore_levels:
                tunnels_ignored.add(p2name)

    num_total = len(info)
    num_down = len(tunnels_down)
    num_up = num_total - num_down

    num_ignored = len(tunnels_ignored)
    num_down_and_not_ignored = num_down - num_ignored

    infotext = "Total: %d, Up: %d, Down: %d, Ignored: %s"\
               % (num_total, num_up, num_down, num_ignored)

    warn, crit = params.get("levels", (None, None))
    status = 0
    if crit is not None and num_down_and_not_ignored >= crit:
        status = 2
    elif warn is not None and num_down_and_not_ignored >= warn:
        status = 1
    if status:
        infotext += " (warn/crit at %s/%s)" % (warn, crit)

    yield status, infotext, [('active_vpn_tunnels', num_up, '', '', 0, num_total)]

    long_output = []
    for title, tunnels in [
        ("Down and not ignored", set(tunnels_down) - set(tunnels_ignored)),
        ("Down", tunnels_down),
        ("Ignored", tunnels_ignored),
    ]:
        if tunnels:
            long_output.append("%s:" % title)
            long_output.append(", ".join(tunnels))
    if long_output:
        yield 0, "\n%s" % "\n".join(long_output)


check_info["fortigate_ipsecvpn"] = {
    "inventory_function": inventory_fortigate_ipsecvpn,
    "check_function": check_fortigate_ipsecvpn,
    "service_description": "VPN IPSec Tunnels",
    "has_perfdata": True,
    "snmp_scan_function": lambda oid: ".1.3.6.1.4.1.12356.101.1" in oid(".1.3.6.1.2.1.1.2.0"),
    "snmp_info": (
        ".1.3.6.1.4.1.12356.101.12.2.2.1",
        [
            3,  # fgVpnTunEntPhase2Name
            20,  # fgVpnTunEntStatus
        ]),
    "default_levels_variable": "fortigate_ipsecvpn_default_levels",
    "group": "ipsecvpn",
}
