#!/bin/bash
#
# test_security
#
# fehlende Patche des Servers ans ULS
#
if [[ $# -lt 2 ]]
 then
  set `date '+%F %T%Lz'`
fi
#
DT="$1 $2"
#
# list updates
#
if [[ -f /etc/SuSE-release ]]
 then
  awk -F ' *= *' -v DT="$DT" '
  /SUSE/ { if( $0 ~ "(x86_64)" )
             a = "64bit"
           else
             a = "32bit"
           if( $0 ~ "Enterprise Server" )
             n = "SLES"
           else
           { gsub(" [0-9].*", "")
             n = $0
           }
         }
  $1 == "VERSION" { v = $2 }
  $1 == "PATCHLEVEL" { p = $2 }
  END { system("send_test_value Security Updates SuSE-release " DT " \"" n " " v "SP" p "(" a ")\" \" \"") }
  ' /etc/SuSE-release
fi

if [[ -x /usr/bin/zypper ]]
 then
  if zypper -h 2>&1 | fgrep -q 'list-patches'
   then
    P=list-patches
  else
    P=lu
  fi

  zypper ref
  zypper $P 2>/dev/null | tee /tmp/Patche.txt | egrep -v "^---|^Catalog" | \
  awk -v DT="$DT" 'BEGIN {ke=0; se=0; re=0}
       /kernel.*security/ {ke++}
       /security/ {se++ }
       /recommended/ {re++}
      END { system("send_test_zeile Security Updates " DT " kernel:" ke ": security:" se-ke ": recommended:" re ":") }'
  send_file_value Security Updates Patche $DT /tmp/Patche.txt
fi
