b87220450a2ad42ae3c1d419859a683ff086b9cd
1 #!/usr/bin/perl
2 #===============================================================================
3 #
4 # FILE: gosa-server
5 #
6 # USAGE: gosa-si-client
7 #
8 # DESCRIPTION:
9 #
10 # OPTIONS: ---
11 # REQUIREMENTS: libnetaddr-ip-perl
12 # BUGS: ---
13 # NOTES:
14 # AUTHOR: (Andreas Rettenberger), <rettenberger@gonicus.de>
15 # COMPANY:
16 # VERSION: 1.0
17 # CREATED: 12.09.2007 08:54:41 CEST
18 # REVISION: ---
19 #===============================================================================
21 use strict;
22 use warnings;
23 use Getopt::Long;
24 use Config::IniFiles;
25 use POSIX;
26 use Time::HiRes qw( gettimeofday );
28 use POE qw(Component::Server::TCP);
29 use IO::Socket::INET;
30 use NetAddr::IP;
31 use Data::Dumper;
32 use Crypt::Rijndael;
33 use GOSA::GosaSupportDaemon;
34 use Digest::MD5 qw(md5_hex md5 md5_base64);
35 use MIME::Base64;
36 use XML::Simple;
37 use Net::DNS;
39 my $event_dir = "/usr/lib/gosa-si/client/events";
40 use lib "/usr/lib/gosa-si/client/events";
42 my ($cfg_file, %cfg_defaults, $foreground, $verbose, $pid_file, $procid, $pid, $log_file);
43 my ($server_ip, $server_port, $server_key, $server_timeout, $server_domain);
44 my ($client_ip, $client_port, $client_mac_address, $ldap_enabled, $ldap_config, $pam_config, $nss_config);
45 my $xml;
46 my $default_server_key;
47 my $event_hash;
48 my @servers;
49 my $gotoHardwareChecksum;
51 # globalise variables which are used in imported events
52 our $cfg_file;
53 our $server_address;
54 our $client_address;
55 our $server_key;
57 # default variables
58 our $REGISTERED_FLAG = 1;
60 %cfg_defaults = (
61 "general" =>
62 {"log_file" => [\$log_file, "/var/run/".$0.".log"],
63 "pid_file" => [\$pid_file, "/var/run/".$0.".pid"],
64 },
65 "client" =>
66 {"client_port" => [\$client_port, "20083"],
67 "client_ip" => [\$client_ip, "0.0.0.0"],
68 "client_mac_address" => [\$client_mac_address, "00:00:00:00:00:00"],
69 "ldap" => [\$ldap_enabled, 1],
70 "ldap_config" => [\$ldap_config, "/etc/ldap/ldap.conf"],
71 "pam_config" => [\$pam_config, "/etc/pam_ldap.conf"],
72 "nss_config" => [\$nss_config, "/etc/libnss_ldap.conf"],
73 },
74 "server" =>
75 {"server_ip" => [\$server_ip, "127.0.0.1"],
76 "server_port" => [\$server_port, "20081"],
77 "server_key" => [\$server_key, ""],
78 "server_timeout" => [\$server_timeout, 10],
79 "server_domain" => [\$server_domain, ""],
80 },
82 );
85 #=== FUNCTIONS = functions =====================================================
87 #=== FUNCTION ================================================================
88 # NAME: check_cmdline_param
89 # PARAMETERS:
90 # RETURNS:
91 # DESCRIPTION:
92 #===============================================================================
93 sub check_cmdline_param () {
94 my $err_config;
95 my $err_counter = 0;
96 if(not defined($cfg_file)) {
97 $cfg_file = "/etc/gosa-si/client.conf";
98 if(! -r $cfg_file) {
99 $err_config = "please specify a config file";
100 $err_counter += 1;
101 }
102 }
103 if( $err_counter > 0 ) {
104 &usage( "", 1 );
105 if( defined( $err_config)) { print STDERR "$err_config\n"}
106 print STDERR "\n";
107 exit( -1 );
108 }
109 }
112 #=== FUNCTION ================================================================
113 # NAME: read_configfile
114 # PARAMETERS: cfg_file - string -
115 # RETURNS:
116 # DESCRIPTION:
117 #===============================================================================
118 sub read_configfile {
119 my ($cfg_file, %cfg_defaults) = @_ ;
120 my $cfg;
121 if( defined( $cfg_file) && ( length($cfg_file) > 0 )) {
122 if( -r $cfg_file ) {
123 $cfg = Config::IniFiles->new( -file => $cfg_file );
124 } else {
125 print STDERR "Couldn't read config file!";
126 }
127 } else {
128 $cfg = Config::IniFiles->new() ;
129 }
130 foreach my $section (keys %cfg_defaults) {
131 foreach my $param (keys %{$cfg_defaults{ $section }}) {
132 my $pinfo = $cfg_defaults{ $section }{ $param };
133 ${@$pinfo[ 0 ]} = $cfg->val( $section, $param, @$pinfo[ 1 ] );
134 }
135 }
136 }
139 #=== FUNCTION ================================================================
140 # NAME: check_pid
141 # PARAMETERS:
142 # RETURNS:
143 # DESCRIPTION:
144 #===============================================================================
145 sub check_pid {
146 $pid = -1;
147 # Check, if we are already running
148 if( open(LOCK_FILE, "<$pid_file") ) {
149 $pid = <LOCK_FILE>;
150 if( defined $pid ) {
151 chomp( $pid );
152 if( -f "/proc/$pid/stat" ) {
153 my($stat) = `cat /proc/$pid/stat` =~ m/$pid \((.+)\).*/;
154 if( $0 eq $stat ) {
155 close( LOCK_FILE );
156 exit -1;
157 }
158 }
159 }
160 close( LOCK_FILE );
161 unlink( $pid_file );
162 }
164 # create a syslog msg if it is not to possible to open PID file
165 if (not sysopen(LOCK_FILE, $pid_file, O_WRONLY|O_CREAT|O_EXCL, 0644)) {
166 my($msg) = "Couldn't obtain lockfile '$pid_file' ";
167 if (open(LOCK_FILE, '<', $pid_file)
168 && ($pid = <LOCK_FILE>))
169 {
170 chomp($pid);
171 $msg .= "(PID $pid)\n";
172 } else {
173 $msg .= "(unable to read PID)\n";
174 }
175 if( ! ($foreground) ) {
176 openlog( $0, "cons,pid", "daemon" );
177 syslog( "warning", $msg );
178 closelog();
179 }
180 else {
181 print( STDERR " $msg " );
182 }
183 exit( -1 );
184 }
185 }
188 #=== FUNCTION ================================================================
189 # NAME: logging
190 # PARAMETERS: level - string - default 'info'
191 # msg - string -
192 # facility - string - default 'LOG_DAEMON'
193 # RETURNS:
194 # DESCRIPTION:
195 #===============================================================================
196 sub daemon_log {
197 # log into log_file
198 my( $msg, $level ) = @_;
199 if(not defined $msg) { return }
200 if(not defined $level) { $level = 1 }
201 if(defined $log_file){
202 open(LOG_HANDLE, ">>$log_file");
203 if(not defined open( LOG_HANDLE, ">>$log_file" )) {
204 print STDERR "cannot open $log_file: $!";
205 return }
206 chomp($msg);
207 if($level <= $verbose){
208 my ($seconds, $minutes, $hours, $monthday, $month,
209 $year, $weekday, $yearday, $sommertime) = localtime(time);
210 $hours = $hours < 10 ? $hours = "0".$hours : $hours;
211 $minutes = $minutes < 10 ? $minutes = "0".$minutes : $minutes;
212 $seconds = $seconds < 10 ? $seconds = "0".$seconds : $seconds;
213 my @monthnames = ("Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct", "Nov", "Dec");
214 $month = $monthnames[$month];
215 $monthday = $monthday < 10 ? $monthday = "0".$monthday : $monthday;
216 $year+=1900;
217 my $name = $0;
218 $name =~ s/\.\///;
220 my $log_msg = "$month $monthday $hours:$minutes:$seconds $name $msg\n";
221 print LOG_HANDLE $log_msg;
222 if( $foreground ) {
223 print STDERR $log_msg;
224 }
225 }
226 close( LOG_HANDLE );
227 }
228 #log into syslog
229 # my ($msg, $level, $facility) = @_;
230 # if(not defined $msg) {return}
231 # if(not defined $level) {$level = "info"}
232 # if(not defined $facility) {$facility = "LOG_DAEMON"}
233 # openlog($0, "pid,cons,", $facility);
234 # syslog($level, $msg);
235 # closelog;
236 # return;
237 }
240 #=== FUNCTION ================================================================
241 # NAME: get_interfaces
242 # PARAMETERS: none
243 # RETURNS: (list of interfaces)
244 # DESCRIPTION: Uses proc fs (/proc/net/dev) to get list of interfaces.
245 #===============================================================================
246 sub get_interfaces {
247 my @result;
248 my $PROC_NET_DEV= ('/proc/net/dev');
250 open(PROC_NET_DEV, "<$PROC_NET_DEV")
251 or die "Could not open $PROC_NET_DEV";
253 my @ifs = <PROC_NET_DEV>;
255 close(PROC_NET_DEV);
257 # Eat first two line
258 shift @ifs;
259 shift @ifs;
261 chomp @ifs;
262 foreach my $line(@ifs) {
263 my $if= (split /:/, $line)[0];
264 $if =~ s/^\s+//;
265 push @result, $if;
266 }
268 return @result;
269 }
271 #=== FUNCTION ================================================================
272 # NAME: get_mac
273 # PARAMETERS: interface name (i.e. eth0)
274 # RETURNS: (mac address)
275 # DESCRIPTION: Uses ioctl to get mac address directly from system.
276 #===============================================================================
277 sub get_mac {
278 my $ifreq= shift;
279 my $result;
280 if ($ifreq && length($ifreq) > 0) {
281 if($ifreq eq "all") {
282 if(defined($server_ip)) {
283 $result = &get_local_mac_for_remote_ip($server_ip);
284 }
285 elsif ($client_mac_address && length($client_mac_address) > 0 && !($client_mac_address eq "00:00:00:00:00:00")){
286 $result = &client_mac_address;
287 }
288 else {
289 $result = "00:00:00:00:00:00";
290 }
291 } else {
292 my $SIOCGIFHWADDR= 0x8927; # man 2 ioctl_list
294 # A configured MAC Address should always override a guessed value
295 if ($client_mac_address and length($client_mac_address) > 0 and not($client_mac_address eq "00:00:00:00:00:00")) {
296 $result= $client_mac_address;
297 }
298 else {
299 socket SOCKET, PF_INET, SOCK_DGRAM, getprotobyname('ip')
300 or die "socket: $!";
302 if(ioctl SOCKET, $SIOCGIFHWADDR, $ifreq) {
303 my ($if, $mac)= unpack 'h36 H12', $ifreq;
305 if (length($mac) > 0) {
306 $mac=~ m/^([0-9a-f][0-9a-f])([0-9a-f][0-9a-f])([0-9a-f][0-9a-f])([0-9a-f][0-9a-f])([0-9a-f][0-9a-f])([0-9a-f][0-9a-f])$/;
307 $mac= sprintf("%s:%s:%s:%s:%s:%s", $1, $2, $3, $4, $5, $6);
308 $result = $mac;
309 }
310 }
311 }
312 }
313 }
314 return $result;
315 }
318 #=== FUNCTION ================================================================
319 # NAME: get_interface_for_ip
320 # PARAMETERS: ip address (i.e. 192.168.0.1)
321 # RETURNS: array: list of interfaces if ip=0.0.0.0, matching interface if found, undef else
322 # DESCRIPTION: Uses proc fs (/proc/net/dev) to get list of interfaces.
323 #===============================================================================
324 sub get_interface_for_ip {
325 my $result;
326 my $ip= shift;
327 if ($ip && length($ip) > 0) {
328 my @ifs= &get_interfaces();
329 if($ip eq "0.0.0.0") {
330 $result = "all";
331 } else {
332 foreach (@ifs) {
333 my $if=$_;
334 if(get_ip($if) eq $ip) {
335 $result = $if;
336 last;
337 }
338 }
339 }
340 }
341 return $result;
342 }
345 #=== FUNCTION ================================================================
346 # NAME: get_ip
347 # PARAMETERS: interface name (i.e. eth0)
348 # RETURNS: (ip address)
349 # DESCRIPTION: Uses ioctl to get ip address directly from system.
350 #===============================================================================
351 sub get_ip {
352 my $ifreq= shift;
353 my $result= "";
354 my $SIOCGIFADDR= 0x8915; # man 2 ioctl_list
355 my $proto= getprotobyname('ip');
357 socket SOCKET, PF_INET, SOCK_DGRAM, $proto
358 or die "socket: $!";
360 if(ioctl SOCKET, $SIOCGIFADDR, $ifreq) {
361 my ($if, $sin) = unpack 'a16 a16', $ifreq;
362 my ($port, $addr) = sockaddr_in $sin;
363 my $ip = inet_ntoa $addr;
365 if ($ip && length($ip) > 0) {
366 $result = $ip;
367 }
368 }
370 return $result;
371 }
374 #=== FUNCTION ================================================================
375 # NAME: get_local_mac_for_remote_ip
376 # PARAMETERS: none (takes server_ip from global variable)
377 # RETURNS: (ip address from interface that is used for communication)
378 # DESCRIPTION: Uses ioctl to get routing table from system, checks which entry
379 # matches (defaultroute last).
380 #===============================================================================
381 sub get_local_mac_for_remote_ip {
382 my $server_ip= shift;
383 my $result= "00:00:00:00:00:00";
384 my $PROC_NET_ROUTE= ('/proc/net/route');
386 open(PROC_NET_ROUTE, "<$PROC_NET_ROUTE")
387 or die "Could not open $PROC_NET_ROUTE";
389 my @ifs = <PROC_NET_ROUTE>;
391 close(PROC_NET_ROUTE);
393 # Eat header line
394 shift @ifs;
395 chomp @ifs;
396 foreach my $line(@ifs) {
397 my ($Iface,$Destination,$Gateway,$Flags,$RefCnt,$Use,$Metric,$Mask,$MTU,$Window,$IRTT)=split(/\s/, $line);
398 my $destination;
399 my $mask;
400 my ($d,$c,$b,$a)=unpack('a2 a2 a2 a2', $Destination);
401 $destination= sprintf("%d.%d.%d.%d", hex($a), hex($b), hex($c), hex($d));
402 ($d,$c,$b,$a)=unpack('a2 a2 a2 a2', $Mask);
403 $mask= sprintf("%d.%d.%d.%d", hex($a), hex($b), hex($c), hex($d));
404 if(new NetAddr::IP($server_ip)->within(new NetAddr::IP($destination, $mask))) {
405 # destination matches route, save mac and exit
406 $result= &get_mac($Iface);
407 last;
408 }
409 }
411 return $result;
412 }
415 sub new_ldap_config {
416 my ($msg_hash) = @_ ;
417 my $element;
418 my @ldap_uris;
419 my $ldap_base;
420 my @ldap_options;
421 my @pam_options;
422 my @nss_options;
423 my $goto_admin;
424 my $goto_secret;
425 my $admin_base= "";
426 my $department= "";
427 my $unit_tag;
429 # Transform input into array
430 while ( my ($key, $value) = each(%$msg_hash) ) {
431 if ($key =~ /^(source|target|header)$/) {
432 next;
433 }
435 foreach $element (@$value) {
436 if ($key =~ /^ldap_uri$/) {
437 push (@ldap_uris, $element);
438 next;
439 }
440 if ($key =~ /^ldap_base$/) {
441 $ldap_base= $element;
442 next;
443 }
444 if ($key =~ /^goto_admin$/) {
445 $goto_admin= $element;
446 next;
447 }
448 if ($key =~ /^goto_secret$/) {
449 $goto_secret= $element;
450 next;
451 }
452 if ($key =~ /^ldap_cfg$/) {
453 push (@ldap_options, "$element");
454 next;
455 }
456 if ($key =~ /^pam_cfg$/) {
457 push (@pam_options, "$element");
458 next;
459 }
460 if ($key =~ /^nss_cfg$/) {
461 push (@nss_options, "$element");
462 next;
463 }
464 if ($key =~ /^admin_base$/) {
465 $admin_base= $element;
466 next;
467 }
468 if ($key =~ /^department$/) {
469 $department= $element;
470 next;
471 }
472 if ($key =~ /^unit_tag$/) {
473 $unit_tag= $element;
474 next;
475 }
476 }
477 }
479 # Unit tagging enabled?
480 if (defined $unit_tag){
481 push (@pam_options, "pam_filter gosaUnitTag=$unit_tag");
482 push (@nss_options, "nss_base_passwd $admin_base?sub?gosaUnitTag=$unit_tag");
483 push (@nss_options, "nss_base_group $admin_base?sub?gosaUnitTag=$unit_tag");
484 }
486 # Setup ldap.conf
487 my $file1;
488 my $file2;
489 open(file1, "> $ldap_config");
490 print file1 "# This file was automatically generated by gosa-si-client. Do not change.\n";
491 print file1 "URI";
492 foreach $element (@ldap_uris) {
493 print file1 " $element";
494 }
495 print file1 "\nBASE $ldap_base\n";
496 foreach $element (@ldap_options) {
497 print file1 "$element\n";
498 }
499 close (file1);
500 daemon_log("wrote $ldap_config", 5);
502 # Setup pam_ldap.conf / libnss_ldap.conf
503 open(file1, "> $pam_config");
504 open(file2, "> $nss_config");
505 print file1 "# This file was automatically generated by gosa-si-client. Do not change.\n";
506 print file2 "# This file was automatically generated by gosa-si-client. Do not change.\n";
507 print file1 "uri";
508 print file2 "uri";
509 foreach $element (@ldap_uris) {
510 print file1 " $element";
511 print file2 " $element";
512 }
513 print file1 "\nbase $ldap_base\n";
514 print file2 "\nbase $ldap_base\n";
515 foreach $element (@pam_options) {
516 print file1 "$element\n";
517 }
518 foreach $element (@nss_options) {
519 print file2 "$element\n";
520 }
521 close (file2);
522 daemon_log("wrote $nss_config", 5);
523 close (file1);
524 daemon_log("wrote $pam_config", 5);
526 # Create goto.secrets if told so - for compatibility reasons
527 if (defined $goto_admin){
528 open(file1, "> /etc/goto/secret");
529 close(file1);
530 chown(0,0, "/etc/goto/secret");
531 chmod(0600, "/etc/goto/secret");
532 open(file1, "> /etc/goto/secret");
533 print file1 "GOTOADMIN=\"$goto_admin\"\nGOTOSECRET=\"$goto_secret\"\n";
534 close(file1);
535 daemon_log("wrote /etc/goto/secret", 5);
536 }
540 # Write shell based config
541 my $cfg_name= dirname($ldap_config)."/ldap-shell.conf";
542 open(file1, "> $cfg_name");
543 print file1 "LDAP_BASE=\"$ldap_base\"\n";
544 print file1 "ADMIN_BASE=\"$admin_base\"\n";
545 print file1 "DEPARTMENT=\"$department\"\n";
546 print file1 "UNIT_TAG=\"".(defined $unit_tag ? "$unit_tag" : "")."\"\n";
547 print file1 "UNIT_TAG_FILTER=\"".(defined $unit_tag ? "(gosaUnitTag=$unit_tag)" : "")."\"\n";
548 close(file1);
549 daemon_log("wrote $cfg_name", 5);
551 return;
553 }
556 sub generate_hw_digest {
557 my $hw_data;
558 foreach my $line (split /\n/, `cat /proc/bus/pci/devices`) {
559 $hw_data.= sprintf "%s", $line =~ /[^\s]+\s([^\s]+)\s.*/;
560 }
561 return(md5_base64($hw_data));
562 }
565 sub create_passwd {
566 my $new_passwd = "";
567 for(my $i=0; $i<31; $i++) {
568 $new_passwd .= ("a".."z","A".."Z",0..9)[int(rand(62))]
569 }
571 return $new_passwd;
572 }
575 sub get_server_addresses {
576 my $domain= shift;
577 my @result;
579 my $error = 0;
580 my $res = Net::DNS::Resolver->new;
581 my $query = $res->send("_gosad._tcp.".$domain, "SRV");
582 my @hits;
584 if ($query) {
585 foreach my $rr ($query->answer) {
586 push(@hits, $rr->target.":".$rr->port);
587 }
588 }
589 else {
590 #warn "query failed: ", $res->errorstring, "\n";
591 $error++;
592 }
594 if( $error == 0 ) {
595 foreach my $hit (@hits) {
596 my ($hit_name, $hit_port) = split(/:/, $hit);
598 my $address_query = $res->send($hit_name);
599 if( 1 == length($address_query->answer) ) {
600 foreach my $rr ($address_query->answer) {
601 push(@result, $rr->address.":".$hit_port);
602 }
603 }
604 }
605 }
607 # my $dig_cmd= 'dig +nocomments srv _gosad._tcp.'.$domain;
608 #
609 # my $output= `$dig_cmd 2>&1`;
610 # open (PIPE, "$dig_cmd 2>&1 |");
611 # while(<PIPE>) {
612 # chomp $_;
613 # # If it's not a comment
614 # if($_ =~ m/^[^;]/) {
615 # my @matches= split /\s+/;
616 #
617 # # Push hostname with port
618 # if($matches[3] eq 'SRV') {
619 # push @result, $matches[7].':'.$matches[6];
620 # } elsif ($matches[3] eq 'A') {
621 # my $i=0;
622 #
623 # # Substitute the hostname with the ip address of the matching A record
624 # foreach my $host (@result) {
625 # if ((split /\:/, $host)[0] eq $matches[0]) {
626 # $result[$i]= $matches[4].':'.(split /\:/, $host)[1];
627 # }
628 # $i++;
629 # }
630 # }
631 # }
632 # }
633 # close(PIPE);
634 return @result;
635 }
638 ##=== FUNCTION ================================================================
639 ## NAME: create_ciphering
640 ## PARAMETERS: passwd - string - used to create ciphering
641 ## RETURNS: cipher - object
642 ## DESCRIPTION: creates a Crypt::Rijndael::MODE_CBC object with passwd as key
643 ##===============================================================================
644 #sub create_ciphering {
645 # my ($passwd) = @_;
646 # $passwd = substr(md5_hex("$passwd") x 32, 0, 32);
647 # my $iv = substr(md5_hex('GONICUS GmbH'),0, 16);
648 #
649 # #daemon_log("iv: $iv", 7);
650 # #daemon_log("key: $passwd", 7);
651 # my $my_cipher = Crypt::Rijndael->new($passwd , Crypt::Rijndael::MODE_CBC());
652 # $my_cipher->set_iv($iv);
653 # return $my_cipher;
654 #}
655 #
656 #
657 #sub create_ciphering {
658 # my ($passwd) = @_;
659 # $passwd = substr(md5_hex("$passwd") x 32, 0, 32);
660 # my $iv = substr(md5_hex('GONICUS GmbH'),0, 16);
661 # my $my_cipher = Crypt::Rijndael->new($passwd , Crypt::Rijndael::MODE_CBC());
662 # $my_cipher->set_iv($iv);
663 # return $my_cipher;
664 #}
665 #
666 #
667 #sub encrypt_msg {
668 # my ($msg, $key) = @_;
669 # my $my_cipher = &create_ciphering($key);
670 # {
671 # use bytes;
672 # $msg = "\0"x(16-length($msg)%16).$msg;
673 # }
674 # $msg = $my_cipher->encrypt($msg);
675 # chomp($msg = &encode_base64($msg));
676 # # there are no newlines allowed inside msg
677 # $msg=~ s/\n//g;
678 # return $msg;
679 #}
680 #
681 #
682 #sub decrypt_msg {
683 # my ($msg, $key) = @_ ;
684 # $msg = &decode_base64($msg);
685 # my $my_cipher = &create_ciphering($key);
686 # $msg = $my_cipher->decrypt($msg);
687 # $msg =~ s/\0*//g;
688 # return $msg;
689 #}
692 #=== FUNCTION ================================================================
693 # NAME: send_msg_hash2address
694 # PARAMETERS: msg_hash - hash - xml_hash created with function create_xml_hash
695 # PeerAddr string - socket address to send msg
696 # PeerPort string - socket port, if not included in socket address
697 # RETURNS: nothing
698 # DESCRIPTION: ????
699 #===============================================================================
700 sub send_msg_hash2address {
701 my ($msg_hash, $address, $passwd) = @_ ;
703 # fetch header for logging
704 my $header = @{$msg_hash->{header}}[0];
706 # generate xml string
707 my $msg_xml = &create_xml_string($msg_hash);
709 # encrypt xml msg
710 my $crypted_msg = &encrypt_msg($msg_xml, $passwd);
712 # opensocket
713 my $socket = &open_socket($address);
714 if(not defined $socket){
715 daemon_log("cannot send '$header'-msg to $address , server not reachable", 5);
716 return 1;
717 }
719 # send xml msg
720 print $socket $crypted_msg."\n";
722 close $socket;
724 daemon_log("send '$header'-msg to $address", 1);
725 daemon_log("message:\n$msg_xml", 8);
726 return 0;
727 }
730 sub send_msg_to_target {
731 my ($msg, $address, $encrypt_key, $msg_header) = @_ ;
732 my $error = 0;
734 if( $msg_header ) {
735 $msg_header = "'$msg_header'-";
736 }
737 else {
738 $msg_header = "";
739 }
741 # encrypt xml msg
742 my $crypted_msg = &encrypt_msg($msg, $encrypt_key);
744 # opensocket
745 my $socket = &open_socket($address);
746 if( !$socket ) {
747 daemon_log("cannot send ".$msg_header."msg to $address , host not reachable", 1);
748 $error++;
749 }
751 if( $error == 0 ) {
752 # send xml msg
753 print $socket $crypted_msg."\n";
755 daemon_log("send ".$msg_header."msg to $address", 1);
756 daemon_log("message:\n$msg", 8);
758 }
760 # close socket in any case
761 if( $socket ) {
762 close $socket;
763 }
765 return;
766 }
769 sub open_socket {
770 my ($PeerAddr, $PeerPort) = @_ ;
771 if(defined($PeerPort)){
772 $PeerAddr = $PeerAddr.":".$PeerPort;
773 }
774 my $socket;
775 $socket = new IO::Socket::INET(PeerAddr => $PeerAddr,
776 Porto => "tcp",
777 Type => SOCK_STREAM,
778 Timeout => 5,
779 );
780 if(not defined $socket) {
781 return;
782 }
783 &daemon_log("open_socket: $PeerAddr", 7);
784 return $socket;
785 }
788 #=== FUNCTION ================================================================
789 # NAME: register_at_server
790 # PARAMETERS:
791 # RETURNS:
792 # DESCRIPTION:
793 #===============================================================================
794 sub register_at_gosa_si_server {
795 my ($kernel) = $_[KERNEL];
797 if( $REGISTERED_FLAG == 1 ) {
799 # create new passwd and ciphering object for client-server communication
800 $server_key = &create_passwd();
802 my $events = join( ", ", keys %{$event_hash} );
804 while(1) {
806 # fetch first gosa-si-server from @servers
807 my $server = shift(@servers);
809 if( !$server ) {
810 daemon_log("no gosa-si-server left in list of servers", 1);
811 daemon_log("unable to register at a gosa-si-server, force shutdown", 1);
812 exit(1);
813 }
815 # create registration msg
816 my $register_hash = &create_xml_hash("here_i_am", $client_address, $server);
817 &add_content2xml_hash($register_hash, "new_passwd", $server_key);
818 &add_content2xml_hash($register_hash, "mac_address", &get_local_mac_for_remote_ip(sprintf("%s", $server =~ /^([0-9\.]*?):.*$/)));
819 &add_content2xml_hash($register_hash, "events", $events);
820 &add_content2xml_hash($register_hash, "gotoHardwareChecksum", $gotoHardwareChecksum);
822 # send xml hash to server with general server passwd
823 my $res = &send_msg_hash2address($register_hash, $server, $default_server_key);
824 last;
825 }
826 daemon_log("waiting for msg 'register_at_gosa_si_server'",1);
827 $kernel->delay_set('register_at_gosa_si_server',2);
828 }
829 return;
830 }
833 sub check_key_and_xml_validity {
834 my ($crypted_msg, $module_key) = @_;
835 #print STDERR "crypted_msg:$crypted_msg\n";
836 #print STDERR "modul_key:$module_key\n";
838 my $msg;
839 my $msg_hash;
840 eval{
841 $msg = &decrypt_msg($crypted_msg, $module_key);
842 &main::daemon_log("decrypted_msg: \n$msg", 8);
844 $msg_hash = $xml->XMLin($msg, ForceArray=>1);
846 # check header
847 my $header_l = $msg_hash->{'header'};
848 if( 1 != @{$header_l} ) {
849 die 'no or more headers specified';
850 }
851 my $header = @{$header_l}[0];
852 if( 0 == length $header) {
853 die 'header has length 0';
854 }
856 # check source
857 my $source_l = $msg_hash->{'source'};
858 if( 1 != @{$source_l} ) {
859 die 'no or more sources specified';
860 }
861 my $source = @{$source_l}[0];
862 if( 0 == length $source) {
863 die 'source has length 0';
864 }
866 # check target
867 my $target_l = $msg_hash->{'target'};
868 if( 1 != @{$target_l} ) {
869 die 'no or more targets specified ';
870 }
871 my $target = @{$target_l}[0];
872 if( 0 == length $target) {
873 die 'target has length 0 ';
874 }
876 };
877 if($@) {
878 &main::daemon_log("WARNING: do not understand the message or msg is not gosa-si envelope conform:", 5);
879 &main::daemon_log("$@", 8);
880 }
882 return ($msg, $msg_hash);
883 }
886 sub import_events {
888 if (not -e $event_dir) {
889 daemon_log("ERROR: cannot find directory or directory is not readable: $event_dir", 1);
890 }
891 opendir (DIR, $event_dir) or die "ERROR while loading gosa-si-events from directory $event_dir : $!\n";
893 while (defined (my $event = readdir (DIR))) {
894 if( $event eq "." || $event eq ".." ) { next; }
896 eval{ require $event; };
897 if( $@ ) {
898 daemon_log("import of event module '$event' failed", 1);
899 daemon_log("$@", 8);
900 next;
901 }
903 $event =~ /(\S*?).pm$/;
904 my $event_module = $1;
905 my $events_l = eval( $1."::get_events()") ;
906 foreach my $event_name (@{$events_l}) {
907 $event_hash->{$event_name} = $event_module;
908 }
910 }
911 }
914 sub server_input {
915 my ($heap,$input,$wheel) = @_[HEAP, ARG0, ARG1];
916 my $error = 0;
917 my $answer;
919 daemon_log("Incoming msg:\n$input\n", 8);
921 my ($msg, $msg_hash) = &check_key_and_xml_validity($input, $server_key);
922 if( (!$msg) || (!$msg_hash) ) {
923 daemon_log("Deciphering of incoming msg failed", 5);
924 $error++;
925 }
927 ######################
928 # process incoming msg
929 if( $error == 0 ) {
930 my $header = @{$msg_hash->{header}}[0];
931 my $source = @{$msg_hash->{source}}[0];
933 if( exists $event_hash->{$header} ) {
934 # a event exists with the header as name
935 daemon_log("found event '$header' at event-module '".$event_hash->{$header}."'", 5);
936 no strict 'refs';
937 $answer = &{$event_hash->{$header}."::$header"}($msg, $msg_hash);
938 }
939 }
941 ########
942 # answer
943 if( $answer ) {
944 if( $answer =~ "<header>registered</header>") {
945 $REGISTERED_FLAG = 0;
946 }
947 else {
948 &send_msg_to_address($answer, $server_address, $server_key);
949 }
950 }
952 return;
953 }
955 #==== MAIN = main ==============================================================
956 # parse commandline options
957 Getopt::Long::Configure( "bundling" );
958 GetOptions("h|help" => \&usage,
959 "c|config=s" => \$cfg_file,
960 "f|foreground" => \$foreground,
961 "v|verbose+" => \$verbose,
962 );
964 # read and set config parameters
965 &check_cmdline_param ;
966 &read_configfile($cfg_file, %cfg_defaults);
967 &check_pid;
970 # forward error messages to logfile
971 if ( ! $foreground ) {
972 open STDIN, '/dev/null' or die "Can’t read /dev/null: $!";
973 open STDOUT, '>>/dev/null' or die "Can't write to /dev/null: $!";
974 open STDERR, '>>/dev/null' or die "Can't write to /dev/null: $!";
975 }
977 # Just fork, if we are not in foreground mode
978 if( ! $foreground ) {
979 chdir '/' or die "Can't chdir to /: $!";
980 $pid = fork;
981 setsid or die "Can't start a new session: $!";
982 umask 0;
983 }
984 else {
985 $pid = $$;
986 }
988 # Do something useful - put our PID into the pid_file
989 if( 0 != $pid ) {
990 open( LOCK_FILE, ">$pid_file" );
991 print LOCK_FILE "$pid\n";
992 close( LOCK_FILE );
993 if( !$foreground ) {
994 exit( 0 )
995 };
996 }
998 daemon_log(" ", 1);
999 daemon_log("$0 started!", 1);
1001 # delete old DBsqlite lock files
1002 system('rm -f /tmp/gosa_si_lock*gosa-si-client*');
1005 # complete client_address
1006 $client_address = $client_ip.":".$client_port;
1009 # detect own ip and mac address
1010 my $network_interface= &get_interface_for_ip($client_ip);
1011 $client_mac_address= &get_mac($network_interface);
1012 daemon_log("gosa-si-client ip address detected: $client_ip", 1);
1013 daemon_log("gosa-si-client mac address detected: $client_mac_address", 1);
1016 # import events
1017 &import_events();
1020 # compute hardware checksum
1021 $gotoHardwareChecksum= &generate_hw_digest();
1022 daemon_log("gosa-si-client gotoHardwareChecksum detected: $gotoHardwareChecksum", 1);
1025 # create socket for incoming xml messages
1026 POE::Component::Server::TCP->new(
1027 Alias => 'gosa-si-client',
1028 Port => $client_port,
1029 ClientInput => \&server_input,
1030 );
1031 daemon_log("start socket for incoming xml messages at port '$client_port' ", 1);
1034 # prepare variables
1035 if (defined $server_ip && defined $server_port) {
1036 $server_address = $server_ip.":".$server_port;
1037 }
1038 $xml = new XML::Simple();
1039 $default_server_key = $server_key;
1042 # find all possible gosa-si-servers in DNS
1043 if (defined $server_domain) {
1044 my @tmp_servers = &get_server_addresses($server_domain);
1045 foreach my $server (@tmp_servers) {
1046 unshift(@servers, $server);
1047 }
1048 }
1049 # add gosa-si-server address from config file at first position of server list
1050 if (defined $server_address) {
1051 unshift(@servers, $server_address);
1052 }
1053 my $servers_string = join(", ", @servers);
1054 daemon_log("found servers in configuration file and via DNS: $servers_string", 5);
1057 POE::Session->create(
1058 inline_states => {
1059 _start => \®ister_at_gosa_si_server ,
1060 register_at_gosa_si_server => \®ister_at_gosa_si_server,
1061 }
1062 );
1064 POE::Kernel->run();
1065 exit;