added sickchill. fixes #48

This commit is contained in:
Nicholas St. Germain 2018-12-16 00:55:59 -06:00
parent 056d211d99
commit 78b7765553
5 changed files with 208 additions and 92 deletions

View file

@ -8,6 +8,7 @@ from os.path import join, exists
from varken.helpers import clean_sid_check
from varken.varkenlogger import BlacklistFilter
from varken.structures import SonarrServer, RadarrServer, OmbiServer, TautulliServer, InfluxServer, CiscoASAFirewall
from varken.structures import SickChillServer
class INIParser(object):
@ -31,6 +32,9 @@ class INIParser(object):
self.tautulli_enabled = False
self.tautulli_servers = []
self.sickchill_enabled = False
self.sickchill_servers = []
self.ciscoasa_enabled = False
self.ciscoasa_firewalls = []
@ -40,7 +44,7 @@ class INIParser(object):
def config_blacklist(self):
filtered_strings = [section.get(k) for key, section in self.config.items()
for k in section if k in BlacklistFilter.blacklisted_strings]
for k in section if k in BlacklistFilter.blacklisted_strings]
self.filtered_strings = list(filter(None, filtered_strings))
for handler in self.logger.handlers:
@ -72,9 +76,9 @@ class INIParser(object):
url_check = url
inc_port = include_port
search = (r'(?:(?:[A-Z0-9](?:[A-Z0-9-]{0,61}[A-Z0-9])?\.)+(?:[A-Z]{2,6}\.?|[A-Z0-9-]{2,}\.?)|' #domain...
r'localhost|' #localhost...
r'\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})' # ...or ip
search = (r'(?:(?:[A-Z0-9](?:[A-Z0-9-]{0,61}[A-Z0-9])?\.)+(?:[A-Z]{2,6}\.?|[A-Z0-9-]{2,}\.?)|' # domain...
r'localhost|' # localhost...
r'\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})' # ...or ip
)
if inc_port:
@ -89,13 +93,14 @@ class INIParser(object):
valid = re.match(regex, url_check) is not None
if not valid:
if inc_port:
self.logger.error('%s is invalid! URL must host/IP and port if not 80 or 443. ie. localhost:8080', url_check)
self.logger.error('%s is invalid! URL must host/IP and port if not 80 or 443. ie. localhost:8080',
url_check)
exit(1)
else:
self.logger.error('%s is invalid! URL must host/IP. ie. localhost', url_check)
exit(1)
else:
self.logger.debug('%s is a vlaid URL in the config.', url_check)
self.logger.debug('%s is a valid URL in the config.', url_check)
return url_check
def parse_opts(self):
@ -116,37 +121,30 @@ class INIParser(object):
if self.sonarr_enabled:
for server_id in self.sonarr_enabled:
sonarr_section = 'sonarr-' + str(server_id)
section = 'sonarr-' + str(server_id)
try:
url = self.url_check(self.config.get(sonarr_section, 'url'))
url = self.url_check(self.config.get(section, 'url'))
apikey = self.config.get(sonarr_section, 'apikey')
apikey = self.config.get(section, 'apikey')
scheme = 'https://' if self.config.getboolean(
sonarr_section, 'ssl') else 'http://'
scheme = 'https://' if self.config.getboolean(section, 'ssl') else 'http://'
verify_ssl = self.config.getboolean(
sonarr_section, 'verify_ssl')
verify_ssl = self.config.getboolean(section, 'verify_ssl')
if scheme != 'https://':
verify_ssl = False
queue = self.config.getboolean(sonarr_section, 'queue')
queue = self.config.getboolean(section, 'queue')
missing_days = self.config.getint(
sonarr_section, 'missing_days')
missing_days = self.config.getint(section, 'missing_days')
future_days = self.config.getint(
sonarr_section, 'future_days')
future_days = self.config.getint(section, 'future_days')
missing_days_run_seconds = self.config.getint(
sonarr_section, 'missing_days_run_seconds')
missing_days_run_seconds = self.config.getint(section, 'missing_days_run_seconds')
future_days_run_seconds = self.config.getint(
sonarr_section, 'future_days_run_seconds')
future_days_run_seconds = self.config.getint(section, 'future_days_run_seconds')
queue_run_seconds = self.config.getint(
sonarr_section, 'queue_run_seconds')
queue_run_seconds = self.config.getint(section, 'queue_run_seconds')
server = SonarrServer(server_id, scheme + url, apikey, verify_ssl, missing_days,
missing_days_run_seconds, future_days, future_days_run_seconds,
@ -154,40 +152,35 @@ class INIParser(object):
self.sonarr_servers.append(server)
except configparser.NoOptionError as e:
self.radarr_enabled = False
self.sonarr_enabled = False
self.logger.error(
'%s disabled. Error: %s', sonarr_section, e)
'%s disabled. Error: %s', section, e)
# Parse Radarr options
self.radarr_enabled = self.enable_check('radarr_server_ids')
if self.radarr_enabled:
for server_id in self.radarr_enabled:
radarr_section = 'radarr-' + str(server_id)
section = 'radarr-' + str(server_id)
try:
url = self.url_check(self.config.get(radarr_section, 'url'))
url = self.url_check(self.config.get(section, 'url'))
apikey = self.config.get(radarr_section, 'apikey')
apikey = self.config.get(section, 'apikey')
scheme = 'https://' if self.config.getboolean(
radarr_section, 'ssl') else 'http://'
scheme = 'https://' if self.config.getboolean(section, 'ssl') else 'http://'
verify_ssl = self.config.getboolean(
radarr_section, 'verify_ssl')
verify_ssl = self.config.getboolean(section, 'verify_ssl')
if scheme != 'https://':
verify_ssl = False
queue = self.config.getboolean(radarr_section, 'queue')
queue = self.config.getboolean(section, 'queue')
queue_run_seconds = self.config.getint(
radarr_section, 'queue_run_seconds')
queue_run_seconds = self.config.getint(section, 'queue_run_seconds')
get_missing = self.config.getboolean(
radarr_section, 'get_missing')
get_missing = self.config.getboolean(section, 'get_missing')
get_missing_run_seconds = self.config.getint(
radarr_section, 'get_missing_run_seconds')
get_missing_run_seconds = self.config.getint(section, 'get_missing_run_seconds')
server = RadarrServer(server_id, scheme + url, apikey, verify_ssl, queue, queue_run_seconds,
get_missing, get_missing_run_seconds)
@ -195,36 +188,31 @@ class INIParser(object):
except configparser.NoOptionError as e:
self.radarr_enabled = False
self.logger.error(
'%s disabled. Error: %s', radarr_section, e)
'%s disabled. Error: %s', section, e)
# Parse Tautulli options
self.tautulli_enabled = self.enable_check('tautulli_server_ids')
if self.tautulli_enabled:
for server_id in self.tautulli_enabled:
tautulli_section = 'tautulli-' + str(server_id)
section = 'tautulli-' + str(server_id)
try:
url = self.url_check(self.config.get(tautulli_section, 'url'))
url = self.url_check(self.config.get(section, 'url'))
fallback_ip = self.config.get(
tautulli_section, 'fallback_ip')
fallback_ip = self.config.get(section, 'fallback_ip')
apikey = self.config.get(tautulli_section, 'apikey')
apikey = self.config.get(section, 'apikey')
scheme = 'https://' if self.config.getboolean(
tautulli_section, 'ssl') else 'http://'
scheme = 'https://' if self.config.getboolean(section, 'ssl') else 'http://'
verify_ssl = self.config.getboolean(
tautulli_section, 'verify_ssl')
verify_ssl = self.config.getboolean(section, 'verify_ssl')
if scheme != 'https://':
verify_ssl = False
get_activity = self.config.getboolean(
tautulli_section, 'get_activity')
get_activity = self.config.getboolean(section, 'get_activity')
get_activity_run_seconds = self.config.getint(
tautulli_section, 'get_activity_run_seconds')
get_activity_run_seconds = self.config.getint(section, 'get_activity_run_seconds')
server = TautulliServer(server_id, scheme + url, fallback_ip, apikey, verify_ssl, get_activity,
get_activity_run_seconds)
@ -232,39 +220,33 @@ class INIParser(object):
except configparser.NoOptionError as e:
self.tautulli_enabled = False
self.logger.error(
'%s disabled. Error: %s', tautulli_section, e)
'%s disabled. Error: %s', section, e)
# Parse Ombi options
self.ombi_enabled = self.enable_check('ombi_server_ids')
if self.ombi_enabled:
for server_id in self.ombi_enabled:
ombi_section = 'ombi-' + str(server_id)
section = 'ombi-' + str(server_id)
try:
url = self.url_check(self.config.get(ombi_section, 'url'))
url = self.url_check(self.config.get(section, 'url'))
apikey = self.config.get(ombi_section, 'apikey')
apikey = self.config.get(section, 'apikey')
scheme = 'https://' if self.config.getboolean(
ombi_section, 'ssl') else 'http://'
scheme = 'https://' if self.config.getboolean(section, 'ssl') else 'http://'
verify_ssl = self.config.getboolean(
ombi_section, 'verify_ssl')
verify_ssl = self.config.getboolean(section, 'verify_ssl')
if scheme != 'https://':
verify_ssl = False
request_type_counts = self.config.getboolean(
ombi_section, 'get_request_type_counts')
request_type_counts = self.config.getboolean(section, 'get_request_type_counts')
request_type_run_seconds = self.config.getint(
ombi_section, 'request_type_run_seconds')
request_type_run_seconds = self.config.getint(section, 'request_type_run_seconds')
request_total_counts = self.config.getboolean(
ombi_section, 'get_request_total_counts')
request_total_counts = self.config.getboolean(section, 'get_request_total_counts')
request_total_run_seconds = self.config.getint(
ombi_section, 'request_total_run_seconds')
request_total_run_seconds = self.config.getint(section, 'request_total_run_seconds')
server = OmbiServer(server_id, scheme + url, apikey, verify_ssl, request_type_counts,
request_type_run_seconds, request_total_counts, request_total_run_seconds)
@ -272,35 +254,61 @@ class INIParser(object):
except configparser.NoOptionError as e:
self.ombi_enabled = False
self.logger.error(
'%s disabled. Error: %s', ombi_section, e)
'%s disabled. Error: %s', section, e)
# Parse SickChill options
self.sickchill_enabled = self.enable_check('sickchill_server_ids')
if self.sickchill_enabled:
for server_id in self.sickchill_enabled:
section = 'sickchill-' + str(server_id)
try:
url = self.url_check(self.config.get(section, 'url'))
apikey = self.config.get(section, 'apikey')
scheme = 'https://' if self.config.getboolean(section, 'ssl') else 'http://'
verify_ssl = self.config.getboolean(section, 'verify_ssl')
if scheme != 'https://':
verify_ssl = False
get_missing = self.config.getboolean(section, 'get_missing')
get_missing_run_seconds = self.config.getint(section, 'get_missing_run_seconds')
server = SickChillServer(server_id, scheme + url, apikey, verify_ssl,
get_missing, get_missing_run_seconds)
self.sickchill_servers.append(server)
except configparser.NoOptionError as e:
self.sickchill_enabled = False
self.logger.error(
'%s disabled. Error: %s', section, e)
# Parse ASA opts
self.ciscoasa_enabled = self.enable_check('ciscoasa_firewall_ids')
if self.ciscoasa_enabled:
for firewall_id in self.ciscoasa_enabled:
ciscoasa_section = 'ciscoasa-' + str(firewall_id)
section = 'ciscoasa-' + str(firewall_id)
try:
url = self.url_check(self.config.get(ciscoasa_section, 'url'))
url = self.url_check(self.config.get(section, 'url'))
username = self.config.get(ciscoasa_section, 'username')
username = self.config.get(section, 'username')
password = self.config.get(ciscoasa_section, 'password')
password = self.config.get(section, 'password')
scheme = 'https://' if self.config.getboolean(
ciscoasa_section, 'ssl') else 'http://'
scheme = 'https://' if self.config.getboolean(section, 'ssl') else 'http://'
verify_ssl = self.config.getboolean(
ciscoasa_section, 'verify_ssl')
verify_ssl = self.config.getboolean(section, 'verify_ssl')
if scheme != 'https://':
verify_ssl = False
outside_interface = self.config.get(
ciscoasa_section, 'outside_interface')
outside_interface = self.config.get(section, 'outside_interface')
get_bandwidth_run_seconds = self.config.getint(
ciscoasa_section, 'get_bandwidth_run_seconds')
get_bandwidth_run_seconds = self.config.getint(section, 'get_bandwidth_run_seconds')
firewall = CiscoASAFirewall(firewall_id, scheme + url, username, password, outside_interface,
verify_ssl, get_bandwidth_run_seconds)
@ -308,4 +316,4 @@ class INIParser(object):
except configparser.NoOptionError as e:
self.ciscoasa_enabled = False
self.logger.error(
'%s disabled. Error: %s', ciscoasa_section, e)
'%s disabled. Error: %s', section, e)