diff --git a/nagixsc_http2nagios.py b/nagixsc_http2nagios.py
index 034213885c9e48bcbab4436aa7552b65bf0e7e8c..085609d8d7fb8e12d9e83ac9c23d6fa83ff0af84 100755 (executable)
--- a/nagixsc_http2nagios.py
+++ b/nagixsc_http2nagios.py
#!/usr/bin/python
import BaseHTTPServer
+import ConfigParser
import base64
import cgi
-import md5
+import optparse
import os
import re
import subprocess
+import sys
-config = { 'ip': '',
- 'port': 15667,
- }
+try:
+ from hashlib import md5
+except ImportError:
+ from md5 import md5
-users = { 'nagixsc': '019b0966d98fb71d1a4bc4ca0c81d5cc', # PW: nagixsc
- }
+##############################################################################
-XMLFILESIZE=102400
-X2N='./nagixsc_xml2nagios.py -O passive -vvv -f -'
+parser = optparse.OptionParser()
+
+parser.add_option('-c', '', dest='cfgfile', help='Config file')
+
+parser.set_defaults(cfgfile='http2nagios.cfg')
+
+(options, args) = parser.parse_args()
+
+cfgread = ConfigParser.SafeConfigParser()
+cfgread.optionxform = str # We need case-sensitive options
+cfg_list = cfgread.read(options.cfgfile)
+
+if cfg_list == []:
+ print 'Config file "%s" could not be read!' % options.cfgfile
+ sys.exit(1)
+
+config = {}
+try:
+ config['ip'] = cfgread.get('server', 'ip')
+ config['port'] = cfgread.getint('server', 'port')
+
+ config['max_xml_file_size'] = cfgread.get('server', 'max_xml_file_size')
+ config['xml2nagios_cmdline'] = cfgread.get('server', 'xml2nagios_cmdline')
+
+except ConfigParser.NoOptionError, e:
+ print 'Config file error: %s ' % e
+ sys.exit(1)
+
+users = {}
+for u in cfgread.options('users'):
+ users[u] = cfgread.get('users', u)
+
+##############################################################################
class HTTP2NagiosHandler(BaseHTTPServer.BaseHTTPRequestHandler):
- def http_error(code, output):
+ def http_error(self, code, output):
self.send_response(code)
self.send_header('Content-Type', 'text/plain')
self.end_headers()
def do_POST(self):
- cmdline = X2N
+ cmdline = config['xml2nagios_cmdline']
# Check Basic Auth
try:
authdata = base64.b64decode(self.headers['Authorization'].split(' ')[1]).split(':')
- if not users[authdata[0]] == md5.md5(authdata[1]).hexdigest():
+ if not users[authdata[0]] == md5(authdata[1]).hexdigest():
raise Exception
except:
self.send_response(401)