#!/usr/bin/python
# -*- encoding: utf-8; py-indent-offset: 4 -*-
# +------------------------------------------------------------------+
# |             ____ _               _        __  __ _  __           |
# |            / ___| |__   ___  ___| | __   |  \/  | |/ /           |
# |           | |   | '_ \ / _ \/ __| |/ /   | |\/| | ' /            |
# |           | |___| | | |  __/ (__|   <    | |  | | . \            |
# |            \____|_| |_|\___|\___|_|\_\___|_|  |_|_|\_\           |
# |                                                                  |
# | Copyright Mathias Kettner 2013             mk@mathias-kettner.de |
# +------------------------------------------------------------------+
#
# This file is part of Check_MK.
# The official homepage is at http://mathias-kettner.de/check_mk.
#
# check_mk is free software;  you can redistribute it and/or modify it
# under the  terms of the  GNU General Public License  as published by
# the Free Software Foundation in version 2.  check_mk is  distributed
# in the hope that it will be useful, but WITHOUT ANY WARRANTY;  with-
# out even the implied warranty of  MERCHANTABILITY  or  FITNESS FOR A
# PARTICULAR PURPOSE. See the  GNU General Public License for more de-
# ails.  You should have  received  a copy of the  GNU  General Public
# License along with GNU Make; see the file  COPYING.  If  not,  write
# to the Free Software Foundation, Inc., 51 Franklin St,  Fifth Floor,
# Boston, MA 02110-1301 USA.

# OID: 1.3.6.1.4.1.9.9.171.1.2.3.1.7.###
# cikeTunRemoteValue
# Description
#       "The value of the remote peer identity.
#       If the remote peer type is an IP Address, then this
#       is the IP Address used to identify the remote peer.
#       If the remote peer type is a host name, then
#       this is the host name used to identify the
#       remote peer."

def check_cisco_vpn_tunnel(item, params, info):
    if not info:
        return 3, "SNMP Data for VPN Tunnel Missing"

    tunnels = params.get('tunnels',[])
    tunnel_alias  = ""
    if not params.get('state'):
        tunnel_worst_state = 2
    else:
        tunnel_worst_state  = params.get('state')
    if item in [tunnel[0] for tunnel in tunnels]:
        if tunnel[1]:
            tunnel_alias = " (%s)" % tunnel[1]
        tunnel_worst_state = tunnel[2]

    extra_info = ""
    state = 0
    if [item] not in info:
        extra_info = " - Tunnel is missing"
        state = tunnel_worst_state

    result = "%s%s%s" % (item, tunnel_alias, extra_info)
    return state, result

check_info["cisco_vpn_tunnel"] = {
    "check_function"        : check_cisco_vpn_tunnel,
    "inventory_function"    : lambda info: [(item[0], {}) for item in info],
    "service_description"   : "VPN Tunnel %s",
    "has_perfdata"          : False,
    "group"                 : "vpn_tunnel",
    "snmp_scan_function"    : lambda oid: oid(".1.3.6.1.2.1.1.1.0").lower().startswith("cisco adaptive security"),
    "snmp_info"             : ( ".1.3.6.1.4.1.9.9.171.1.2.3.1", [ 7 ] ),
}

