Code

Added opts file.
[gosa.git] / gosa-si / gosa-si-server
index 7d66fb2effcf6594f5ce7f582dfa7c756f23ee08..bdc990bea7e824f875f57849b8837f195610ba37 100755 (executable)
@@ -96,20 +96,20 @@ our $known_clients_db;
 
 %cfg_defaults = (
 "general" => {
-    "log_file" => [\$log_file, "/var/run/".$0.".log"],
-    "pid_file" => [\$pid_file, "/var/run/".$0.".pid"],
+    "log-file" => [\$log_file, "/var/run/".$0.".log"],
+    "pid-file" => [\$pid_file, "/var/run/".$0.".pid"],
     },
 "server" => {
 #    "ip" => [\$server_ip, "0.0.0.0"],
     "port" => [\$server_port, "20081"],
-    "known_clients_file_name" => [\$known_clients_file_name, '/var/lib/gosa-si/gosa-si-server_known_clients.db' ],
-    "known_server_file_name" => [\$known_server_file_name, '/var/lib/gosa-si/gosa-si-server_known_server.db'],
+    "known-clients" => [\$known_clients_file_name, '/var/lib/gosa-si/clients.db' ],
+    "known-servers" => [\$known_server_file_name, '/var/lib/gosa-si/servers.db'],
     },
 "GOsaPackages" => {
     "ip" => [\$gosa_ip, "0.0.0.0"],
     "port" => [\$gosa_port, "20082"],
-    "job_queue_file_name" => [\$job_queue_file_name, '/var/lib/gosa-si/gosa-si-server_jobs.db'],
-    "job_queue_loop_delay" => [\$job_queue_loop_delay, 3],
+    "job-queue" => [\$job_queue_file_name, '/var/lib/gosa-si/jobs.db'],
+    "job-queue-loop-delay" => [\$job_queue_loop_delay, 3],
     "key" => [\$GosaPackages_key, "none"],
     },
 "SIPackages" => {
@@ -377,40 +377,41 @@ sub check_key_and_xml_validity {
     my $msg_hash;
     eval{
         $msg = &decrypt_msg($crypted_msg, $module_key);
-        &main::daemon_log("decrypted_msg: \n$msg", 8);
 
-        $msg_hash = $xml->XMLin($msg, ForceArray=>1);
+       if ($msg =~ /<xml>/i){
+               &main::daemon_log("decrypted_msg: \n$msg", 8);
+               $msg_hash = $xml->XMLin($msg, ForceArray=>1);
 
-        # check header
-        my $header_l = $msg_hash->{'header'};
-        if( 1 != @{$header_l} ) {
-            die'header error';
-        }
-        my $header = @{$header_l}[0];
-        if( 0 == length $header) {
-            die 'header error';
-        }
-
-        # check source
-        my $source_l = $msg_hash->{'source'};
-        if( 1 != @{$source_l} ) {
-            die'source error';
-        }
-        my $source = @{$source_l}[0];
-        if( 0 == length $source) {
-            die 'source error';
-        }
+               # check header
+               my $header_l = $msg_hash->{'header'};
+               if( 1 != @{$header_l} ) {
+                   die 'header error';
+               }
+               my $header = @{$header_l}[0];
+               if( 0 == length $header) {
+                   die 'header error';
+               }
 
-        # check target
-        my $target_l = $msg_hash->{'target'};
-        if( 1 != @{$target_l} ) {
-            die'target error';
-        }
-        my $target = @{$target_l}[0];
-        if( 0 == length $target) {
-            die 'target error';
-        }
+               # check source
+               my $source_l = $msg_hash->{'source'};
+               if( not defined @{$source_l} or 1 != @{$source_l} ) {
+                   die 'source error';
+               }
+               my $source = @{$source_l}[0];
+               if( 0 == length $source) {
+                   die 'source error';
+               }
 
+               # check target
+               my $target_l = $msg_hash->{'target'};
+               if( 1 != @{$target_l} ) {
+                   die'target error';
+               }
+               my $target = @{$target_l}[0];
+               if( 0 == length $target) {
+                   die 'target error';
+               }
+       }
     };
     if($@) {
         &main::daemon_log("WARNING: do not understand the message", 5);
@@ -505,12 +506,8 @@ sub input_from_unknown_host {
        my %act_modules = %$known_modules;
 
        while( my ($mod, $info) = each(%act_modules)) {
-        # check a key exists for this module
-
-
-print STDERR "SIPackages_key:$SIPackages_key\n";
-
 
+        # check a key exists for this module
         my $module_key = ${$mod."_key"};
         if( ! $module_key ) {
             daemon_log("ERROR: no key specified in config file for $mod", 1);
@@ -581,7 +578,7 @@ sub get_encrypt_key {
     my $error = 0;
 
     # target can be in known_server
-    if( !$encrypt_key ) {
+    if( not defined $encrypt_key ) {
         my $sql_statement= "SELECT * FROM known_server WHERE hostname='$target'";
         my $query_res = $known_server_db->select_dbentry( $sql_statement ); 
         while( my ($hit_num, $hit) = each %{ $query_res } ) {    
@@ -593,10 +590,9 @@ sub get_encrypt_key {
             last;
         }
     }
-   
 
     # target can be in known_client
-    if( !$encrypt_key ) {
+    if( not defined $encrypt_key ) {
         my $sql_statement= "SELECT * FROM known_clients WHERE hostname='$target'";
         my $query_res = $known_clients_db->select_dbentry( $sql_statement ); 
         while( my ($hit_num, $hit) = each %{ $query_res } ) {    
@@ -861,110 +857,110 @@ sub client_input {
         # for each answer in answer list
         foreach my $answer ( @{$answer_l} ) {
 
-                       my $error = 0;
-                       # check answer if gosa-si envelope conform
-                       if(defined($answer)) {
-                               my $answer_hash = $xml->XMLin($answer, ForceArray=>1);
-                               $answer_header = @{$answer_hash->{'header'}}[0];
-                               @answer_target_l = @{$answer_hash->{'target'}};
-                               $answer_source = @{$answer_hash->{'source'}}[0];
-                               if( !$answer_header ) {
-                                       daemon_log('ERROR: module answer is not gosa-si envelope conform: no header', 1);
-                                       daemon_log("\n$answer", 8);
-                                       $error++;
-                               }
-                               if( 0 == length @answer_target_l ) {
-                                       daemon_log('ERROR: module answer is not gosa-si envelope conform: no targets', 1);
-                                       daemon_log("\n$answer", 8);
-                                       $error++;
+               my $error = 0;
+               # check answer if gosa-si envelope conform
+               if(defined($answer)) {
+                       my $answer_hash = $xml->XMLin($answer, ForceArray=>1);
+                       $answer_header = @{$answer_hash->{'header'}}[0];
+                       @answer_target_l = @{$answer_hash->{'target'}};
+                       $answer_source = @{$answer_hash->{'source'}}[0];
+                       if( !$answer_header ) {
+                               daemon_log('ERROR: module answer is not gosa-si envelope conform: no header', 1);
+                               daemon_log("\n$answer", 8);
+                               $error++;
+                       }
+                       if( 0 == length @answer_target_l ) {
+                               daemon_log('ERROR: module answer is not gosa-si envelope conform: no targets', 1);
+                               daemon_log("\n$answer", 8);
+                               $error++;
+                       }
+                       if( !$answer_source ) {
+                               daemon_log('ERROR: module answer is not gosa-si envelope conform: no source', 1);
+                               daemon_log("\n$answer", 8);
+                               $error++;
+                       }
+
+                       if( $error != 0 ) {
+                               next;
+                       }
+               }
+
+               # deliver msg to all targets 
+               foreach my $answer_target ( @answer_target_l ) {
+                       if( $answer_target eq "*" ) {
+                               # answer is for all clients
+                               my $sql_statement= "SELECT * FROM known_clients";
+                               my $query_res = $known_clients_db->select_dbentry( $sql_statement ); 
+                               while( my ($hit_num, $hit) = each %{ $query_res } ) {    
+                                       my $host_name = $hit->{hostname};
+                                       my $host_key = $hit->{hostkey};
+                                       &send_msg_to_target($answer, $host_name, $host_key, $answer_header);
                                }
-                               if( !$answer_source ) {
-                                       daemon_log('ERROR: module answer is not gosa-si envelope conform: no source', 1);
-                                       daemon_log("\n$answer", 8);
-                                       $error++;
+                       }
+                       elsif( $answer_target eq "GOSA" ) {
+                               # answer is for GOSA and has to returned to connected client
+                               my $gosa_answer = &encrypt_msg($answer, $GosaPackages_key);
+                               $client_answer = $gosa_answer;
+                       }
+                       elsif( $answer_target eq "KNOWN_SERVER" ) {
+                               # answer is for all server in known_server
+                               my $sql_statement= "SELECT * FROM known_server";
+                               my $query_res = $known_server_db->select_dbentry( $sql_statement ); 
+                               while( my ($hit_num, $hit) = each %{ $query_res } ) {    
+                                       my $host_name = $hit->{hostname};
+                                       my $host_key = $hit->{hostkey};
+                                       $answer =~ s/KNOWN_SERVER/$host_name/g;
+                                       &send_msg_to_target($answer, $host_name, $host_key, $answer_header);
                                }
+                       }
+                       elsif( $answer_target =~ /^([0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2})$/i ) {
+                               daemon_log("target is mac address '$answer_target', looking for host in known_clients", 3);
+                               my $sql_statement = "SELECT * FROM known_clients WHERE macaddress='$answer_target'";
+                               my $query_res = $known_clients_db->select_dbentry( $sql_statement );
+                               my $found_ip_flag = 0;
+                               while( my ($hit_num, $hit) = each %{ $query_res } ) {    
+                                       my $host_name = $hit->{hostname};
+                                       my $host_key = $hit->{hostkey};
+                                       $answer =~ s/$answer_target/$host_name/g;
+                                       daemon_log("found host '$host_name', assoziated to '$answer_target'", 3);
+                                       &send_msg_to_target($answer, $host_name, $host_key, $answer_header);
+                                       $found_ip_flag++ ;
+                               }   
+                               if( $found_ip_flag == 0) {
+                                       daemon_log("WARNING: no host found in known_clients with mac address '$answer_target', forward msg to bus", 1);
+                                       my $sql_statement = "SELECT * FROM known_server WHERE hostname='$bus_address'";
+                                       my $query_res = $known_server_db->select_dbentry( $sql_statement );
+                                       while( my ($hit_num, $hit) = each %{ $query_res } ) {    
+                                               my $bus_address = $hit->{hostname};
+                                               my $bus_key = $hit->{hostkey};
+                                               &send_msg_to_target($answer, $bus_address, $bus_key, $answer_header);
+                                               last;
+                                       }
 
-                               if( $error != 0 ) {
+                               }
+                       } else {
+                               # ... answer is for one specific host
+
+                               # get encrypt_key
+                               my $encrypt_key = &get_encrypt_key($answer_target);
+                               if( not defined $encrypt_key ) {
+                                       # unknown target, forward msg to bus
+                                       daemon_log("WARNING: unknown target '$answer_target', forward msg to bus", 3);
+                                       my $sql_statement = "SELECT * FROM known_server WHERE hostname='$bus_address'";
+                                       my $query_res = $known_server_db->select_dbentry( $sql_statement );
+                                       my $bus_key = $query_res->{1}->{hostkey};
+                                       &send_msg_to_target($answer, $bus_address, $bus_key, $answer_header);
                                        next;
                                }
+                               # send_msg
+                               &send_msg_to_target($answer, $answer_target, $encrypt_key, $answer_header);
                        }
-
-            # deliver msg to all targets 
-            foreach my $answer_target ( @answer_target_l ) {
-                if( $answer_target eq "*" ) {
-                    # answer is for all clients
-                    my $sql_statement= "SELECT * FROM known_clients";
-                    my $query_res = $known_clients_db->select_dbentry( $sql_statement ); 
-                    while( my ($hit_num, $hit) = each %{ $query_res } ) {    
-                        my $host_name = $hit->{hostname};
-                        my $host_key = $hit->{hostkey};
-                        &send_msg_to_target($answer, $host_name, $host_key, $answer_header);
-                     }
-                }
-                elsif( $answer_target eq "GOSA" ) {
-                    # answer is for GOSA and has to returned to connected client
-                    my $gosa_answer = &encrypt_msg($answer, $GosaPackages_key);
-                    $client_answer = $gosa_answer;
-                }
-                elsif( $answer_target eq "KNOWN_SERVER" ) {
-                    # answer is for all server in known_server
-                    my $sql_statement= "SELECT * FROM known_server";
-                    my $query_res = $known_server_db->select_dbentry( $sql_statement ); 
-                    while( my ($hit_num, $hit) = each %{ $query_res } ) {    
-                        my $host_name = $hit->{hostname};
-                        my $host_key = $hit->{hostkey};
-                        $answer =~ s/KNOWN_SERVER/$host_name/g;
-                        &send_msg_to_target($answer, $host_name, $host_key, $answer_header);
-                    }
-                }
-                elsif( $answer_target =~ /([0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2}:[0-9a-f]{2})/ ) {
-                    daemon_log("target is mac address '$answer_target', looking for host in known_clients", 3);
-                    my $sql_statement = "SELECT * FROM known_clients WHERE macaddress='$answer_target'";
-                    my $query_res = $known_clients_db->select_dbentry( $sql_statement );
-                    my $found_ip_flag = 0;
-                    while( my ($hit_num, $hit) = each %{ $query_res } ) {    
-                        my $host_name = $hit->{hostname};
-                        my $host_key = $hit->{hostkey};
-                        $answer =~ s/$answer_target/$host_name/g;
-                        daemon_log("found host '$host_name', assoziated to '$answer_target'", 3);
-                        &send_msg_to_target($answer, $host_name, $host_key, $answer_header);
-                        $found_ip_flag++ ;
-                    }   
-                    if( $found_ip_flag == 0) {
-                        daemon_log("WARNING: no host found in known_clients with mac address '$answer_target', forward msg to bus", 1);
-                        my $sql_statement = "SELECT * FROM known_server WHERE hostname='$bus_address'";
-                        my $query_res = $known_server_db->select_dbentry( $sql_statement );
-                        while( my ($hit_num, $hit) = each %{ $query_res } ) {    
-                            my $bus_address = $hit->{hostname};
-                            my $bus_key = $hit->{hostkey};
-                            &send_msg_to_target($answer, $bus_address, $bus_key, $answer_header);
-                            last;
-                        }
-
-                    }
-                }
-                else {
-                    # answer is for one specific host
-                    # get encrypt_key
-                    my $encrypt_key = &get_encrypt_key($answer_target);
-                    if( !$encrypt_key ) {
-                        # unknown target, forward msg to bus
-                        daemon_log("WARNING: unknown target '$answer_target', forward msg to bus", 3);
-                        my $sql_statement = "SELECT * FROM known_server WHERE hostname='$bus_address'";
-                        my $query_res = $known_server_db->select_dbentry( $sql_statement );
-                        my $bus_key = $query_res->{1}->{hostkey};
-                        &send_msg_to_target($answer, $bus_address, $bus_key, $answer_header);
-                        next;
-                    }
-                    # send_msg
-                    &send_msg_to_target($answer, $answer_target, $encrypt_key, $answer_header);
-                }
-            }
-        }
+               }
+       }
     }
 
     if( $client_answer ) {
-        $heap->{client}->put($client_answer);
+           $heap->{client}->put($client_answer);
     }
 
     return;
@@ -1096,7 +1092,7 @@ daemon_log(" ", 1);
 daemon_log("$0 started!", 1);
 
 # delete old DBsqlite lock files
-system('rm -f /tmp/gosa_si_lock*gosa-si-server*');
+#unlink('/tmp/gosa_si_lock*');
 
 # connect to gosa-si job queue
 my @job_col_names = ("id INTEGER", "timestamp", "status", "result", "headertag", "targettag", "xmlmessage", "macaddress");