1 #!/usr/bin/perl
2 #===============================================================================
3 #
4 # FILE: gosa-sd
5 #
6 # USAGE: ./gosa-sd
7 #
8 # DESCRIPTION:
9 #
10 # OPTIONS: ---
11 # REQUIREMENTS: libconfig-inifiles-perl libcrypt-rijndael-perl libxml-simple-perl
12 # libdata-dumper-simple-perl libdbd-sqlite3-perl libnet-ldap-perl
13 # libpoe-perl
14 # BUGS: ---
15 # NOTES:
16 # AUTHOR: (Andreas Rettenberger), <rettenberger@gonicus.de>
17 # COMPANY:
18 # VERSION: 1.0
19 # CREATED: 12.09.2007 08:54:41 CEST
20 # REVISION: ---
21 #===============================================================================
23 use strict;
24 use warnings;
25 use Getopt::Long;
26 use Config::IniFiles;
27 use POSIX;
29 use Fcntl;
30 use IO::Socket::INET;
31 use IO::Handle;
32 use IO::Select;
33 use Symbol qw(qualify_to_ref);
34 use Crypt::Rijndael;
35 use MIME::Base64;
36 use Digest::MD5 qw(md5 md5_hex md5_base64);
37 use XML::Simple;
38 use Data::Dumper;
39 use Sys::Syslog qw( :DEFAULT setlogsock);
40 use Cwd;
41 use File::Spec;
42 use File::Basename;
43 use GOSA::DBsqlite;
44 use GOSA::GosaSupportDaemon;
45 use POE qw(Component::Server::TCP);
47 my $modules_path = "/usr/lib/gosa-si/modules";
48 use lib "/usr/lib/gosa-si/modules";
50 my (%cfg_defaults, $foreground, $verbose, $ping_timeout);
51 my ($bus_activ, $bus, $msg_to_bus, $bus_cipher);
52 my ($server, $server_mac_address);
53 my ($gosa_server, $job_queue_timeout, $job_queue_table_name, $job_queue_file_name,$job_queue_loop_delay);
54 my ($known_modules, $known_clients_file_name, $known_server_file_name);
55 my ($pid_file, $procid, $pid, $log_file);
56 my ($arp_activ, $arp_fifo);
57 my ($xml);
59 # variables declared in config file are always set to 'our'
60 our (%cfg_defaults, $log_file, $pid_file,
61 $server_ip, $server_port, $SIPackages_key,
62 $arp_activ, $gosa_unit_tag,
63 $GosaPackages_key, $gosa_ip, $gosa_port, $gosa_timeout,
64 );
66 # additional variable which should be globaly accessable
67 our $server_address;
68 our $bus_address;
69 our $gosa_address;
70 our $no_bus;
71 our $no_arp;
72 our $verbose;
73 our $forground;
74 our $cfg_file;
76 # specifies the verbosity of the daemon_log
77 $verbose = 0 ;
79 # if foreground is not null, script will be not forked to background
80 $foreground = 0 ;
82 # specifies the timeout seconds while checking the online status of a registrating client
83 $ping_timeout = 5;
85 $no_bus = 0;
86 $bus_activ = "true";
88 $no_arp = 0;
90 # holds all gosa jobs
91 our $job_db;
92 our $job_queue_table_name = 'jobs';
94 # holds all other gosa-sd as well as the gosa-sd-bus
95 our $known_server_db;
97 # holds all registrated clients
98 our $known_clients_db;
99 our $prg= basename($0);
101 %cfg_defaults = (
102 "general" => {
103 "log-file" => [\$log_file, "/var/run/".$prg.".log"],
104 "pid-file" => [\$pid_file, "/var/run/".$prg.".pid"],
105 },
106 "bus" => {
107 "activ" => [\$bus_activ, "true"],
108 },
109 "server" => {
110 # "ip" => [\$server_ip, "0.0.0.0"],
111 "port" => [\$server_port, "20081"],
112 "known-clients" => [\$known_clients_file_name, '/var/lib/gosa-si/clients.db' ],
113 "known-servers" => [\$known_server_file_name, '/var/lib/gosa-si/servers.db'],
114 "gosa-unit-tag" => [\$gosa_unit_tag, ""],
115 },
116 "GOsaPackages" => {
117 "ip" => [\$gosa_ip, "0.0.0.0"],
118 "port" => [\$gosa_port, "20082"],
119 "job-queue" => [\$job_queue_file_name, '/var/lib/gosa-si/jobs.db'],
120 "job-queue-loop-delay" => [\$job_queue_loop_delay, 3],
121 "key" => [\$GosaPackages_key, "none"],
122 },
123 "SIPackages" => {
124 "key" => [\$SIPackages_key, "none"],
125 },
126 );
129 #=== FUNCTION ================================================================
130 # NAME: usage
131 # PARAMETERS: nothing
132 # RETURNS: nothing
133 # DESCRIPTION: print out usage text to STDERR
134 #===============================================================================
135 sub usage {
136 print STDERR << "EOF" ;
137 usage: $prg [-hvf] [-c config]
139 -h : this (help) message
140 -c <file> : config file
141 -f : foreground, process will not be forked to background
142 -v : be verbose (multiple to increase verbosity)
143 -no-bus : starts $prg without connection to bus
144 -no-arp : starts $prg without connection to arp module
146 EOF
147 print "\n" ;
148 }
151 #=== FUNCTION ================================================================
152 # NAME: read_configfile
153 # PARAMETERS: cfg_file - string -
154 # RETURNS: nothing
155 # DESCRIPTION: read cfg_file and set variables
156 #===============================================================================
157 sub read_configfile {
158 my $cfg;
159 if( defined( $cfg_file) && ( length($cfg_file) > 0 )) {
160 if( -r $cfg_file ) {
161 $cfg = Config::IniFiles->new( -file => $cfg_file );
162 } else {
163 print STDERR "Couldn't read config file!\n";
164 }
165 } else {
166 $cfg = Config::IniFiles->new() ;
167 }
168 foreach my $section (keys %cfg_defaults) {
169 foreach my $param (keys %{$cfg_defaults{ $section }}) {
170 my $pinfo = $cfg_defaults{ $section }{ $param };
171 ${@$pinfo[ 0 ]} = $cfg->val( $section, $param, @$pinfo[ 1 ] );
172 }
173 }
174 }
177 #=== FUNCTION ================================================================
178 # NAME: logging
179 # PARAMETERS: level - string - default 'info'
180 # msg - string -
181 # facility - string - default 'LOG_DAEMON'
182 # RETURNS: nothing
183 # DESCRIPTION: function for logging
184 #===============================================================================
185 sub daemon_log {
186 # log into log_file
187 my( $msg, $level ) = @_;
188 if(not defined $msg) { return }
189 if(not defined $level) { $level = 1 }
190 if(defined $log_file){
191 open(LOG_HANDLE, ">>$log_file");
192 if(not defined open( LOG_HANDLE, ">>$log_file" )) {
193 print STDERR "cannot open $log_file: $!";
194 return }
195 chomp($msg);
196 if($level <= $verbose){
197 my ($seconds, $minutes, $hours, $monthday, $month,
198 $year, $weekday, $yearday, $sommertime) = localtime(time);
199 $hours = $hours < 10 ? $hours = "0".$hours : $hours;
200 $minutes = $minutes < 10 ? $minutes = "0".$minutes : $minutes;
201 $seconds = $seconds < 10 ? $seconds = "0".$seconds : $seconds;
202 my @monthnames = ("Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct", "Nov", "Dec");
203 $month = $monthnames[$month];
204 $monthday = $monthday < 10 ? $monthday = "0".$monthday : $monthday;
205 $year+=1900;
206 my $name = $prg;
208 my $log_msg = "$month $monthday $hours:$minutes:$seconds $name $msg\n";
209 print LOG_HANDLE $log_msg;
210 if( $foreground ) {
211 print STDERR $log_msg;
212 }
213 }
214 close( LOG_HANDLE );
215 }
216 #log into syslog
217 # my ($msg, $level, $facility) = @_;
218 # if(not defined $msg) {return}
219 # if(not defined $level) {$level = "info"}
220 # if(not defined $facility) {$facility = "LOG_DAEMON"}
221 # openlog($0, "pid,cons,", $facility);
222 # syslog($level, $msg);
223 # closelog;
224 # return;
225 }
228 #=== FUNCTION ================================================================
229 # NAME: check_cmdline_param
230 # PARAMETERS: nothing
231 # RETURNS: nothing
232 # DESCRIPTION: validates commandline parameter
233 #===============================================================================
234 sub check_cmdline_param () {
235 my $err_config;
236 my $err_counter = 0;
237 if(not defined($cfg_file)) {
238 $cfg_file = "/etc/gosa-si/server.conf";
239 if(! -r $cfg_file) {
240 $err_config = "please specify a config file";
241 $err_counter += 1;
242 }
243 }
244 if( $err_counter > 0 ) {
245 &usage( "", 1 );
246 if( defined( $err_config)) { print STDERR "$err_config\n"}
247 print STDERR "\n";
248 exit( -1 );
249 }
250 }
253 #=== FUNCTION ================================================================
254 # NAME: check_pid
255 # PARAMETERS: nothing
256 # RETURNS: nothing
257 # DESCRIPTION: handels pid processing
258 #===============================================================================
259 sub check_pid {
260 $pid = -1;
261 # Check, if we are already running
262 if( open(LOCK_FILE, "<$pid_file") ) {
263 $pid = <LOCK_FILE>;
264 if( defined $pid ) {
265 chomp( $pid );
266 if( -f "/proc/$pid/stat" ) {
267 my($stat) = `cat /proc/$pid/stat` =~ m/$pid \((.+)\).*/;
268 if( $0 eq $stat ) {
269 close( LOCK_FILE );
270 exit -1;
271 }
272 }
273 }
274 close( LOCK_FILE );
275 unlink( $pid_file );
276 }
278 # create a syslog msg if it is not to possible to open PID file
279 if (not sysopen(LOCK_FILE, $pid_file, O_WRONLY|O_CREAT|O_EXCL, 0644)) {
280 my($msg) = "Couldn't obtain lockfile '$pid_file' ";
281 if (open(LOCK_FILE, '<', $pid_file)
282 && ($pid = <LOCK_FILE>))
283 {
284 chomp($pid);
285 $msg .= "(PID $pid)\n";
286 } else {
287 $msg .= "(unable to read PID)\n";
288 }
289 if( ! ($foreground) ) {
290 openlog( $0, "cons,pid", "daemon" );
291 syslog( "warning", $msg );
292 closelog();
293 }
294 else {
295 print( STDERR " $msg " );
296 }
297 exit( -1 );
298 }
299 }
301 #=== FUNCTION ================================================================
302 # NAME: import_modules
303 # PARAMETERS: module_path - string - abs. path to the directory the modules
304 # are stored
305 # RETURNS: nothing
306 # DESCRIPTION: each file in module_path which ends with '.pm' and activation
307 # state is on is imported by "require 'file';"
308 #===============================================================================
309 sub import_modules {
310 daemon_log(" ", 1);
312 if (not -e $modules_path) {
313 daemon_log("ERROR: cannot find directory or directory is not readable: $modules_path", 1);
314 }
316 opendir (DIR, $modules_path) or die "ERROR while loading modules from directory $modules_path : $!\n";
317 while (defined (my $file = readdir (DIR))) {
318 if (not $file =~ /(\S*?).pm$/) {
319 next;
320 }
321 my $mod_name = $1;
323 if( $file =~ /ArpHandler.pm/ ) {
324 if( $no_arp > 0 ) {
325 next;
326 }
327 }
329 eval { require $file; };
330 if ($@) {
331 daemon_log("ERROR: gosa-si-server could not load module $file", 1);
332 daemon_log("$@", 5);
333 } else {
334 my $info = eval($mod_name.'::get_module_info()');
335 # Only load module if get_module_info() returns a non-null object
336 if( $info ) {
337 my ($input_address, $input_key, $input, $input_active, $input_type) = @{$info};
338 $known_modules->{$mod_name} = $info;
339 daemon_log("module $mod_name loaded", 1);
340 }
341 }
342 }
343 close (DIR);
344 }
347 #=== FUNCTION ================================================================
348 # NAME: sig_int_handler
349 # PARAMETERS: signal - string - signal arose from system
350 # RETURNS: noting
351 # DESCRIPTION: handels tasks to be done befor signal becomes active
352 #===============================================================================
353 sub sig_int_handler {
354 my ($signal) = @_;
356 daemon_log("shutting down gosa-si-server", 1);
357 exit(1);
358 }
359 $SIG{INT} = \&sig_int_handler;
363 sub check_key_and_xml_validity {
364 my ($crypted_msg, $module_key) = @_;
366 my $msg;
367 my $msg_hash;
368 eval{
369 $msg = &decrypt_msg($crypted_msg, $module_key);
371 if ($msg =~ /<xml>/i){
372 &main::daemon_log("decrypted_msg: \n$msg", 8);
373 $msg_hash = $xml->XMLin($msg, ForceArray=>1);
375 # check header
376 my $header_l = $msg_hash->{'header'};
377 if( 1 != @{$header_l} ) {
378 die 'header error';
379 }
380 my $header = @{$header_l}[0];
381 if( 0 == length $header) {
382 die 'header error';
383 }
385 # check source
386 my $source_l = $msg_hash->{'source'};
387 if( not defined @{$source_l} or 1 != @{$source_l} ) {
388 die 'source error';
389 }
390 my $source = @{$source_l}[0];
391 if( 0 == length $source) {
392 die 'source error';
393 }
395 # check target
396 my $target_l = $msg_hash->{'target'};
397 if( 1 != @{$target_l} ) {
398 die'target error';
399 }
400 my $target = @{$target_l}[0];
401 if( 0 == length $target) {
402 die 'target error';
403 }
404 }
405 };
406 if($@) {
407 &main::daemon_log("WARNING: do not understand the message", 5);
408 &main::daemon_log("$@", 8);
409 }
411 return ($msg, $msg_hash);
412 }
415 sub check_outgoing_xml_validity {
416 my ($msg) = @_;
418 my $msg_hash;
419 eval{
420 $msg_hash = $xml->XMLin($msg, ForceArray=>1);
422 ##############
423 # check header
424 my $header_l = $msg_hash->{'header'};
425 if( 1 != @{$header_l} ) {
426 die 'no or more than one headers specified';
427 }
428 my $header = @{$header_l}[0];
429 if( 0 == length $header) {
430 die 'header has length 0';
431 }
433 ##############
434 # check source
435 my $source_l = $msg_hash->{'source'};
436 if( 1 != @{$source_l} ) {
437 die 'no or more than 1 sources specified';
438 }
439 my $source = @{$source_l}[0];
440 if( 0 == length $source) {
441 die 'source has length 0';
442 }
443 unless( $source =~ /^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}:\d+$/ ||
444 $source =~ /^GOSA$/i ) {
445 die "source '$source' is neither a complete ip-address with port nor 'GOSA'";
446 }
448 ##############
449 # check target
450 my $target_l = $msg_hash->{'target'};
451 if( 0 == @{$target_l} ) {
452 die "no targets specified";
453 }
454 foreach my $target (@$target_l) {
455 if( 0 == length $target) {
456 die "target has length 0";
457 }
458 unless( $target =~ /^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}:\d+$/ ||
459 $target =~ /^GOSA$/i ||
460 $target =~ /^\*$/ ||
461 $target =~ /KNOWN_SERVER/i ||
462 $target =~ /JOBDB/i ||
463 $target =~ /^([0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2})$/i ){
464 die "target '$target' is not a complete ip-address with port or a valid target name or a mac-address";
465 }
466 }
467 };
468 if($@) {
469 daemon_log("WARNING: outgoing msg is not gosa-si envelope conform", 5);
470 daemon_log("$@ ".(defined($msg) && length($msg)>0)?$msg:"Empty Message", 8);
471 $msg_hash = undef;
472 }
474 return ($msg_hash);
475 }
478 sub input_from_known_server {
479 my ($input, $remote_ip) = @_ ;
480 my ($msg, $msg_hash, $module);
482 my $sql_statement= "SELECT * FROM known_server";
483 my $query_res = $known_server_db->select_dbentry( $sql_statement );
485 while( my ($hit_num, $hit) = each %{ $query_res } ) {
486 my $host_name = $hit->{hostname};
487 if( not $host_name =~ "^$remote_ip") {
488 next;
489 }
490 my $host_key = $hit->{hostkey};
491 daemon_log("SIPackages: known_server host_name: $host_name", 7);
492 daemon_log("SIPackages: known_server host_key: $host_key", 7);
494 # check if module can open msg envelope with module key
495 my ($tmp_msg, $tmp_msg_hash) = &check_key_and_xml_validity($input, $host_key);
496 if( (!$tmp_msg) || (!$tmp_msg_hash) ) {
497 daemon_log("SIPackages: deciphering raise error", 7);
498 daemon_log("$@", 8);
499 next;
500 }
501 else {
502 $msg = $tmp_msg;
503 $msg_hash = $tmp_msg_hash;
504 $module = "SIPackages";
505 last;
506 }
507 }
509 if( (!$msg) || (!$msg_hash) || (!$module) ) {
510 daemon_log("Incoming message is not from a known server", 3);
511 }
513 return ($msg, $msg_hash, $module);
514 }
517 sub input_from_known_client {
518 my ($input, $remote_ip) = @_ ;
519 my ($msg, $msg_hash, $module);
521 my $sql_statement= "SELECT * FROM known_clients";
522 my $query_res = $known_clients_db->select_dbentry( $sql_statement );
523 while( my ($hit_num, $hit) = each %{ $query_res } ) {
524 my $host_name = $hit->{hostname};
525 if( not $host_name =~ /^$remote_ip:\d*$/) {
526 next;
527 }
528 my $host_key = $hit->{hostkey};
529 &daemon_log("SIPackages: known_client host_name: $host_name", 7);
530 &daemon_log("SIPackages: known_client host_key: $host_key", 7);
532 # check if module can open msg envelope with module key
533 ($msg, $msg_hash) = &check_key_and_xml_validity($input, $host_key);
535 if( (!$msg) || (!$msg_hash) ) {
536 &daemon_log("SIPackages: deciphering raise error", 7);
537 &daemon_log("$@", 8);
538 next;
539 }
540 else {
541 $module = "SIPackages";
542 last;
543 }
544 }
546 if( (!$msg) || (!$msg_hash) || (!$module) ) {
547 &daemon_log("Incoming message is not from a known client", 3);
548 }
550 return ($msg, $msg_hash, $module);
551 }
554 sub input_from_unknown_host {
555 no strict "refs";
556 my ($input) = @_ ;
557 my ($msg, $msg_hash, $module);
559 my %act_modules = %$known_modules;
561 while( my ($mod, $info) = each(%act_modules)) {
563 # check a key exists for this module
564 my $module_key = ${$mod."_key"};
565 if( ! $module_key ) {
566 if( $mod eq 'ArpHandler' ) {
567 next;
568 }
569 daemon_log("ERROR: no key specified in config file for $mod", 1);
570 next;
571 }
572 daemon_log("$mod: $module_key", 5);
574 # check if module can open msg envelope with module key
575 ($msg, $msg_hash) = &check_key_and_xml_validity($input, $module_key);
576 if( (!$msg) || (!$msg_hash) ) {
577 #daemon_log("$mod: deciphering failed", 5);
578 next;
579 }
580 else {
581 $module = $mod;
582 last;
583 }
584 }
586 if( (!$msg) || (!$msg_hash) || (!$module)) {
587 daemon_log("Incoming message is not from a unknown host", 5);
588 }
590 return ($msg, $msg_hash, $module);
591 }
594 sub create_ciphering {
595 my ($passwd) = @_;
596 if((!defined($passwd)) || length($passwd)==0) {
597 $passwd = "";
598 }
599 $passwd = substr(md5_hex("$passwd") x 32, 0, 32);
600 my $iv = substr(md5_hex('GONICUS GmbH'),0, 16);
601 my $my_cipher = Crypt::Rijndael->new($passwd , Crypt::Rijndael::MODE_CBC());
602 $my_cipher->set_iv($iv);
603 return $my_cipher;
604 }
607 sub encrypt_msg {
608 my ($msg, $key) = @_;
609 my $my_cipher = &create_ciphering($key);
610 {
611 use bytes;
612 $msg = "\0"x(16-length($msg)%16).$msg;
613 }
614 $msg = $my_cipher->encrypt($msg);
615 chomp($msg = &encode_base64($msg));
616 # there are no newlines allowed inside msg
617 $msg=~ s/\n//g;
618 return $msg;
619 }
622 sub decrypt_msg {
624 my ($msg, $key) = @_ ;
625 $msg = &decode_base64($msg);
626 my $my_cipher = &create_ciphering($key);
627 $msg = $my_cipher->decrypt($msg);
628 $msg =~ s/\0*//g;
629 return $msg;
630 }
633 sub get_encrypt_key {
634 my ($target) = @_ ;
635 my $encrypt_key;
636 my $error = 0;
638 # target can be in known_server
639 if( not defined $encrypt_key ) {
640 my $sql_statement= "SELECT * FROM known_server WHERE hostname='$target'";
641 my $query_res = $known_server_db->select_dbentry( $sql_statement );
642 while( my ($hit_num, $hit) = each %{ $query_res } ) {
643 my $host_name = $hit->{hostname};
644 if( $host_name ne $target ) {
645 next;
646 }
647 $encrypt_key = $hit->{hostkey};
648 last;
649 }
650 }
652 # target can be in known_client
653 if( not defined $encrypt_key ) {
654 my $sql_statement= "SELECT * FROM known_clients WHERE hostname='$target'";
655 my $query_res = $known_clients_db->select_dbentry( $sql_statement );
656 while( my ($hit_num, $hit) = each %{ $query_res } ) {
657 my $host_name = $hit->{hostname};
658 if( $host_name ne $target ) {
659 next;
660 }
661 $encrypt_key = $hit->{hostkey};
662 last;
663 }
664 }
666 return $encrypt_key;
667 }
670 #=== FUNCTION ================================================================
671 # NAME: open_socket
672 # PARAMETERS: PeerAddr string something like 192.168.1.1 or 192.168.1.1:10000
673 # [PeerPort] string necessary if port not appended by PeerAddr
674 # RETURNS: socket IO::Socket::INET
675 # DESCRIPTION: open a socket to PeerAddr
676 #===============================================================================
677 sub open_socket {
678 my ($PeerAddr, $PeerPort) = @_ ;
679 if(defined($PeerPort)){
680 $PeerAddr = $PeerAddr.":".$PeerPort;
681 }
682 my $socket;
683 $socket = new IO::Socket::INET(PeerAddr => $PeerAddr,
684 Porto => "tcp",
685 Type => SOCK_STREAM,
686 Timeout => 5,
687 );
688 if(not defined $socket) {
689 return;
690 }
691 &daemon_log("open_socket: $PeerAddr", 7);
692 return $socket;
693 }
696 #=== FUNCTION ================================================================
697 # NAME: get_ip
698 # PARAMETERS: interface name (i.e. eth0)
699 # RETURNS: (ip address)
700 # DESCRIPTION: Uses ioctl to get ip address directly from system.
701 #===============================================================================
702 sub get_ip {
703 my $ifreq= shift;
704 my $result= "";
705 my $SIOCGIFADDR= 0x8915; # man 2 ioctl_list
706 my $proto= getprotobyname('ip');
708 socket SOCKET, PF_INET, SOCK_DGRAM, $proto
709 or die "socket: $!";
711 if(ioctl SOCKET, $SIOCGIFADDR, $ifreq) {
712 my ($if, $sin) = unpack 'a16 a16', $ifreq;
713 my ($port, $addr) = sockaddr_in $sin;
714 my $ip = inet_ntoa $addr;
716 if ($ip && length($ip) > 0) {
717 $result = $ip;
718 }
719 }
721 return $result;
722 }
724 sub get_local_ip_for_remote_ip {
725 my $remote_ip= shift;
726 my $result="0.0.0.0";
728 if($remote_ip =~ /^(\d\d?\d?\.){3}\d\d?\d?$/) {
729 if($remote_ip eq "127.0.0.1") {
730 $result = "127.0.0.1";
731 } else {
732 my $PROC_NET_ROUTE= ('/proc/net/route');
734 open(PROC_NET_ROUTE, "<$PROC_NET_ROUTE")
735 or die "Could not open $PROC_NET_ROUTE";
737 my @ifs = <PROC_NET_ROUTE>;
739 close(PROC_NET_ROUTE);
741 # Eat header line
742 shift @ifs;
743 chomp @ifs;
744 foreach my $line(@ifs) {
745 my ($Iface,$Destination,$Gateway,$Flags,$RefCnt,$Use,$Metric,$Mask,$MTU,$Window,$IRTT)=split(/\s/, $line);
746 my $destination;
747 my $mask;
748 my ($d,$c,$b,$a)=unpack('a2 a2 a2 a2', $Destination);
749 $destination= sprintf("%d.%d.%d.%d", hex($a), hex($b), hex($c), hex($d));
750 ($d,$c,$b,$a)=unpack('a2 a2 a2 a2', $Mask);
751 $mask= sprintf("%d.%d.%d.%d", hex($a), hex($b), hex($c), hex($d));
752 if(new NetAddr::IP($remote_ip)->within(new NetAddr::IP($destination, $mask))) {
753 # destination matches route, save mac and exit
754 $result= &get_ip($Iface);
755 last;
756 }
757 }
758 }
759 } else {
760 daemon_log("get_local_ip_for_remote_ip was called with a non-ip parameter: $remote_ip", 1);
761 }
762 return $result;
763 }
765 sub send_msg_to_target {
766 my ($msg, $address, $encrypt_key, $msg_header) = @_ ;
767 my $error = 0;
768 my $header;
769 my $new_status;
770 my $act_status;
771 my ($sql_statement, $res);
773 if( $msg_header ) {
774 $header = "'$msg_header'-";
775 }
776 else {
777 $header = "";
778 }
780 # Patch the source ip
781 if($msg =~ /<source>0\.0\.0\.0:\d*?<\/source>/) {
782 my $remote_ip = &get_local_ip_for_remote_ip(sprintf("%s", $address =~ /^([0-9\.]*?):.*$/));
783 $msg =~ s/<source>(0\.0\.0\.0):(\d*?)<\/source>/<source>$remote_ip:$2<\/source>/s;
784 }
786 # encrypt xml msg
787 my $crypted_msg = &encrypt_msg($msg, $encrypt_key);
789 # opensocket
790 my $socket = &open_socket($address);
791 if( !$socket ) {
792 daemon_log("cannot send ".$header."msg to $address , host not reachable", 1);
793 $error++;
794 }
796 if( $error == 0 ) {
797 # send xml msg
798 print $socket $crypted_msg."\n";
800 daemon_log("send ".$header."msg to $address", 1);
801 daemon_log("message:\n$msg", 8);
803 }
805 # close socket in any case
806 if( $socket ) {
807 close $socket;
808 }
810 if( $error > 0 ) { $new_status = "down"; }
811 else { $new_status = $msg_header; }
814 # known_clients
815 $sql_statement = "SELECT * FROM known_clients WHERE hostname='$address'";
816 $res = $known_clients_db->select_dbentry($sql_statement);
817 if( keys(%$res) > 0) {
818 $act_status = $res->{1}->{'status'};
819 if( $act_status eq "down" ) {
820 $sql_statement = "DELETE FROM known_clients WHERE hostname='$address'";
821 $res = $known_clients_db->del_dbentry($sql_statement);
822 daemon_log("WARNING: failed 2x to send msg to host '$address', delete host from known_clients", 3);
823 }
824 else {
825 $sql_statement = "UPDATE known_clients SET status='$new_status' WHERE hostname='$address'";
826 $res = $known_clients_db->update_dbentry($sql_statement);
827 if($new_status eq "down"){
828 daemon_log("WARNING: set '$address' from status '$act_status' to '$new_status'", 3);
829 }
830 else {
831 daemon_log("INFO: set '$address' from status '$act_status' to '$new_status'", 5);
832 }
833 }
834 }
836 # known_server
837 $sql_statement = "SELECT * FROM known_server WHERE hostname='$address'";
838 $res = $known_server_db->select_dbentry($sql_statement);
839 if( keys(%$res) > 0 ) {
840 $act_status = $res->{1}->{'status'};
841 if( $act_status eq "down" ) {
842 $sql_statement = "DELETE FROM known_server WHERE hostname='$address'";
843 $res = $known_server_db->del_dbentry($sql_statement);
844 daemon_log("WARNING: failed 2x to a send msg to host '$address', delete host from known_server", 3);
845 }
846 else {
847 $sql_statement = "UPDATE known_server SET status='$new_status' WHERE hostname='$address'";
848 $res = $known_server_db->update_dbentry($sql_statement);
849 if($new_status eq "down"){
850 daemon_log("WARNING: set '$address' from status '$act_status' to '$new_status'", 3);
851 }
852 else {
853 daemon_log("INFO: set '$address' from status '$act_status' to '$new_status'", 5);
854 }
855 }
856 }
858 return;
859 }
862 sub _start {
863 my ($kernel) = $_[KERNEL];
864 &trigger_db_loop($kernel);
865 }
868 sub client_input {
869 no strict "refs";
870 my ($kernel, $session, $heap,$input,$wheel) = @_[KERNEL, SESSION, HEAP, ARG0, ARG1];
871 my $session_id = $session->ID;
872 my ($msg, $msg_hash, $module);
873 my $error = 0;
874 my $answer_l;
875 my ($answer_header, @answer_target_l, $answer_source);
876 my $client_answer;
878 daemon_log("Incoming msg from '".$heap->{'remote_ip'}."'", 7);
879 daemon_log("message:\n$input", 8);
881 ####################
882 # check incoming msg
883 # msg is from a new client or gosa
884 ($msg, $msg_hash, $module) = &input_from_unknown_host($input);
885 # msg is from a gosa-si-server or gosa-si-bus
886 if(( !$msg ) || ( !$msg_hash ) || ( !$module )){
887 ($msg, $msg_hash, $module) = &input_from_known_server($input, $heap->{'remote_ip'});
888 }
889 # msg is from a gosa-si-client
890 if(( !$msg ) || ( !$msg_hash ) || ( !$module )){
891 ($msg, $msg_hash, $module) = &input_from_known_client($input, $heap->{'remote_ip'});
892 }
893 # an error occurred
894 if(( !$msg ) || ( !$msg_hash ) || ( !$module )){
895 $error++;
896 }
898 ######################
899 # process incoming msg
900 if( $error == 0) {
901 daemon_log("Processing module ".$module, 5);
902 $answer_l = &{ $module."::process_incoming_msg" }($msg, $msg_hash, $session_id);
904 if ( 0 > @{$answer_l} ) {
905 my $answer_str = join("\n", @{$answer_l});
906 daemon_log("$module: Got answer from module: \n".$answer_str,8);
907 }
908 }
909 if( !$answer_l ) { $error++ };
911 ########
912 # answer
913 if( $error == 0 ) {
915 foreach my $answer ( @{$answer_l} ) {
916 # for each answer in answer list
918 # check outgoing msg to xml validity
919 my $answer_hash = &check_outgoing_xml_validity($answer);
920 if( not defined $answer_hash ) {
921 next;
922 }
924 $answer_header = @{$answer_hash->{'header'}}[0];
925 @answer_target_l = @{$answer_hash->{'target'}};
926 $answer_source = @{$answer_hash->{'source'}}[0];
928 # deliver msg to all targets
929 foreach my $answer_target ( @answer_target_l ) {
931 # targets of msg are all gosa-si-clients in known_clients_db
932 if( $answer_target eq "*" ) {
933 # answer is for all clients
934 my $sql_statement= "SELECT * FROM known_clients";
935 my $query_res = $known_clients_db->select_dbentry( $sql_statement );
936 while( my ($hit_num, $hit) = each %{ $query_res } ) {
937 my $host_name = $hit->{hostname};
938 my $host_key = $hit->{hostkey};
939 &send_msg_to_target($answer, $host_name, $host_key, $answer_header);
940 }
941 }
943 # targets of msg are all gosa-si-server in known_server_db
944 elsif( $answer_target eq "KNOWN_SERVER" ) {
945 # answer is for all server in known_server
946 my $sql_statement= "SELECT * FROM known_server";
947 my $query_res = $known_server_db->select_dbentry( $sql_statement );
948 while( my ($hit_num, $hit) = each %{ $query_res } ) {
949 my $host_name = $hit->{hostname};
950 my $host_key = $hit->{hostkey};
951 $answer =~ s/KNOWN_SERVER/$host_name/g;
952 &send_msg_to_target($answer, $host_name, $host_key, $answer_header);
953 }
954 }
956 # target of msg is GOsa
957 elsif( $answer_target eq "GOSA" ) {
958 $answer =~ /<session_id>(\d+)<\/session_id>/;
959 my $session_id = $1;
960 my $add_on = "";
961 if( defined $session_id ) {
962 $add_on = ".session_id=$session_id";
963 }
964 # answer is for GOSA and has to returned to connected client
965 my $gosa_answer = &encrypt_msg($answer, $GosaPackages_key);
966 $client_answer = $gosa_answer.$add_on;
967 }
969 # target of msg is job queue at this host
970 elsif( $answer_target eq "JOBDB") {
971 $answer =~ /<header>(\S+)<\/header>/;
972 my $header;
973 if( defined $1 ) { $header = $1; }
974 &send_msg_to_target($answer, $server_address, $GosaPackages_key, $header);
975 }
977 # target of msg is a mac address
978 elsif( $answer_target =~ /^([0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2})$/i ) {
979 daemon_log("target is mac address '$answer_target', looking for host in known_clients", 3);
980 my $sql_statement = "SELECT * FROM known_clients WHERE macaddress='$answer_target'";
981 my $query_res = $known_clients_db->select_dbentry( $sql_statement );
982 my $found_ip_flag = 0;
983 while( my ($hit_num, $hit) = each %{ $query_res } ) {
984 my $host_name = $hit->{hostname};
985 my $host_key = $hit->{hostkey};
986 $answer =~ s/$answer_target/$host_name/g;
987 daemon_log("found host '$host_name', assoziated to '$answer_target'", 3);
988 &send_msg_to_target($answer, $host_name, $host_key, $answer_header);
989 $found_ip_flag++ ;
990 }
991 if( $found_ip_flag == 0) {
992 daemon_log("WARNING: no host found in known_clients with mac address '$answer_target'", 3);
993 if( $bus_activ eq "true" ) {
994 daemon_log("INFO: try to forward msg '$answer_header' to bus '$bus_address'", 5);
995 my $sql_statement = "SELECT * FROM known_server WHERE hostname='$bus_address'";
996 my $query_res = $known_server_db->select_dbentry( $sql_statement );
997 while( my ($hit_num, $hit) = each %{ $query_res } ) {
998 my $bus_address = $hit->{hostname};
999 my $bus_key = $hit->{hostkey};
1000 &send_msg_to_target($answer, $bus_address, $bus_key, $answer_header);
1001 last;
1002 }
1003 }
1005 }
1007 # answer is for one specific host
1008 } else {
1009 # get encrypt_key
1010 my $encrypt_key = &get_encrypt_key($answer_target);
1011 if( not defined $encrypt_key ) {
1012 # unknown target, forward msg to bus
1013 daemon_log("WARNING: unknown target '$answer_target'", 3);
1014 if( $bus_activ eq "true" ) {
1015 daemon_log("INFO: try to forward msg '$answer_header' to bus '$bus_address'", 5);
1016 my $sql_statement = "SELECT * FROM known_server WHERE hostname='$bus_address'";
1017 my $query_res = $known_server_db->select_dbentry( $sql_statement );
1018 my $res_length = keys( %{$query_res} );
1019 if( $res_length == 0 ){
1020 daemon_log("WARNING: send '$answer_header' to '$bus_address' failed, no bus found in known_server", 3);
1021 }
1022 else {
1023 while( my ($hit_num, $hit) = each %{ $query_res } ) {
1024 my $bus_key = $hit->{hostkey};
1025 &send_msg_to_target($answer, $bus_address, $bus_key, $answer_header);
1026 }
1027 }
1028 }
1029 next;
1030 }
1031 # send_msg
1032 &send_msg_to_target($answer, $answer_target, $encrypt_key, $answer_header);
1033 }
1034 }
1035 }
1036 }
1038 if( $client_answer ) {
1039 if( $client_answer =~ s/session_id=(\d+)$// ) {
1040 my $session_id = $1;
1041 if( defined $session_id ) {
1042 my $session_reference = $kernel->ID_id_to_session($session_id);
1043 $heap = $session_reference->get_heap();
1044 }
1045 }
1046 $heap->{client}->put($client_answer);
1047 }
1049 return;
1050 }
1054 sub trigger_db_loop {
1055 # my ($kernel) = $_[KERNEL];
1056 my ($kernel) = @_ ;
1057 $kernel->delay_set('watch_for_new_jobs', $job_queue_loop_delay);
1058 }
1061 sub watch_for_new_jobs {
1062 my ($kernel,$heap) = @_[KERNEL, HEAP];
1064 # check gosa job queue for jobs with executable timestamp
1065 my $timestamp = &get_time();
1067 my $sql_statement = "SELECT * FROM ".$job_queue_table_name.
1068 " WHERE status='waiting' AND timestamp<'$timestamp'";
1070 my $res = $job_db->select_dbentry( $sql_statement );
1072 while( my ($id, $hit) = each %{$res} ) {
1074 my $jobdb_id = $hit->{id};
1075 my $macaddress = $hit->{macaddress};
1076 my $job_msg_hash = &transform_msg2hash($hit->{xmlmessage});
1077 my $out_msg_hash = $job_msg_hash;
1078 my $sql_statement = "SELECT * FROM known_clients WHERE macaddress='$macaddress'";
1079 my $res_hash = $known_clients_db->select_dbentry( $sql_statement );
1080 # expect macaddress is unique!!!!!!
1081 my $target = $res_hash->{1}->{hostname};
1083 if (not defined $target) {
1084 &daemon_log("ERROR: no host found for mac address: $job_msg_hash->{mac}[0]", 1);
1085 &daemon_log("xml message: $hit->{xmlmessage}", 5);
1086 my $sql_statement = "UPDATE $job_queue_table_name ".
1087 "SET status='error', result='no host found for mac address' ".
1088 "WHERE id='$jobdb_id'";
1089 my $res = $job_db->update_dbentry($sql_statement);
1090 next;
1091 }
1093 # add target
1094 &add_content2xml_hash($out_msg_hash, "target", $target);
1096 # add new header
1097 my $out_header = $job_msg_hash->{header}[0];
1098 $out_header =~ s/job_/gosa_/;
1099 delete $out_msg_hash->{header};
1100 &add_content2xml_hash($out_msg_hash, "header", $out_header);
1102 # add sqlite_id
1103 &add_content2xml_hash($out_msg_hash, "jobdb_id", $jobdb_id);
1105 my $out_msg = &create_xml_string($out_msg_hash);
1107 # encrypt msg as a GosaPackage module
1108 my $cipher = &create_ciphering($GosaPackages_key);
1109 my $crypted_out_msg = &encrypt_msg($out_msg, $cipher);
1111 my $error = &send_msg_hash2address($out_msg_hash, "$gosa_ip:$gosa_port", $GosaPackages_key);
1113 if ($error == 0) {
1114 my $sql_statement = "UPDATE $job_queue_table_name ".
1115 "SET status='processing', targettag='$target' ".
1116 "WHERE id='$jobdb_id'";
1117 my $res = $job_db->update_dbentry($sql_statement);
1118 } else {
1119 my $sql_statement = "UPDATE $job_queue_table_name ".
1120 "SET status='error' ".
1121 "WHERE id='$jobdb_id'";
1122 my $res = $job_db->update_dbentry($sql_statement);
1123 }
1124 }
1126 $kernel->delay_set('watch_for_new_jobs',3);
1127 }
1130 #==== MAIN = main ==============================================================
1131 # parse commandline options
1132 Getopt::Long::Configure( "bundling" );
1133 GetOptions("h|help" => \&usage,
1134 "c|config=s" => \$cfg_file,
1135 "f|foreground" => \$foreground,
1136 "v|verbose+" => \$verbose,
1137 "no-bus+" => \$no_bus,
1138 "no-arp+" => \$no_arp,
1139 );
1141 # read and set config parameters
1142 &check_cmdline_param ;
1143 &read_configfile;
1144 &check_pid;
1146 $SIG{CHLD} = 'IGNORE';
1148 # forward error messages to logfile
1149 if( ! $foreground ) {
1150 open(STDERR, '>>', $log_file);
1151 open(STDOUT, '>>', $log_file);
1152 }
1154 # Just fork, if we are not in foreground mode
1155 if( ! $foreground ) {
1156 chdir '/' or die "Can't chdir to /: $!";
1157 $pid = fork;
1158 setsid or die "Can't start a new session: $!";
1159 umask 0;
1160 } else {
1161 $pid = $$;
1162 }
1164 # Do something useful - put our PID into the pid_file
1165 if( 0 != $pid ) {
1166 open( LOCK_FILE, ">$pid_file" );
1167 print LOCK_FILE "$pid\n";
1168 close( LOCK_FILE );
1169 if( !$foreground ) {
1170 exit( 0 )
1171 };
1172 }
1174 daemon_log(" ", 1);
1175 daemon_log("$0 started!", 1);
1177 if ($no_bus > 0) {
1178 $bus_activ = "false"
1179 }
1183 # delete old DBsqlite lock files
1184 #unlink('/tmp/gosa_si_lock*');
1186 # connect to gosa-si job queue
1187 my @job_col_names = ("id INTEGER", "timestamp", "status", "result", "headertag", "targettag", "xmlmessage", "macaddress");
1188 $job_db = GOSA::DBsqlite->new($job_queue_file_name);
1189 $job_db->create_table('jobs', \@job_col_names);
1191 # connect to known_clients_db
1192 my @clients_col_names = ('hostname', 'status', 'hostkey', 'timestamp', 'macaddress', 'events');
1193 $known_clients_db = GOSA::DBsqlite->new($known_clients_file_name);
1194 $known_clients_db->create_table('known_clients', \@clients_col_names);
1196 # connect to known_server_db
1197 my @server_col_names = ('hostname', 'status', 'hostkey', 'timestamp');
1198 $known_server_db = GOSA::DBsqlite->new($known_server_file_name);
1199 $known_server_db->create_table('known_server', \@server_col_names);
1201 # create xml object used for en/decrypting
1202 $xml = new XML::Simple();
1204 # create socket for incoming xml messages
1205 POE::Component::Server::TCP->new(
1206 Port => $server_port,
1207 ClientInput => \&client_input,
1208 );
1209 daemon_log("start socket for incoming xml messages at port '$server_port' ", 1);
1211 # create session for repeatedly checking the job queue for jobs
1212 POE::Session->create(
1213 inline_states => {
1214 _start => \&_start,
1215 watch_for_new_jobs => \&watch_for_new_jobs,
1216 }
1217 );
1220 # import all modules
1221 &import_modules;
1223 # check wether all modules are gosa-si valid passwd check
1225 POE::Kernel->run();
1226 exit;