]>
Commit | Line | Data |
---|---|---|
25697a35 | 1 | /* |
94ff9470 | 2 | * SARG Squid Analysis Report Generator http://sarg.sourceforge.net |
61d965f3 | 3 | * 1998, 2012 |
25697a35 GS |
4 | * |
5 | * SARG donations: | |
6 | * please look at http://sarg.sourceforge.net/donations.php | |
1164c474 FM |
7 | * Support: |
8 | * http://sourceforge.net/projects/sarg/forums/forum/363374 | |
25697a35 GS |
9 | * --------------------------------------------------------------------- |
10 | * | |
11 | * This program is free software; you can redistribute it and/or modify | |
12 | * it under the terms of the GNU General Public License as published by | |
13 | * the Free Software Foundation; either version 2 of the License, or | |
14 | * (at your option) any later version. | |
15 | * | |
16 | * This program is distributed in the hope that it will be useful, | |
17 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
18 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
19 | * GNU General Public License for more details. | |
20 | * | |
21 | * You should have received a copy of the GNU General Public License | |
22 | * along with this program; if not, write to the Free Software | |
23 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111, USA. | |
24 | * | |
25 | */ | |
26 | ||
27 | #include "include/conf.h" | |
5f3cfd1d | 28 | #include "include/defs.h" |
25697a35 | 29 | |
d6e703cc FM |
30 | static char **files_done = NULL; |
31 | static int nfiles_done = 0; | |
32 | ||
bca2fdfd FM |
33 | //! The number of invalid lines found in the redirector report. |
34 | static int RedirectorErrors=0; | |
cf1a88b9 FM |
35 | //! The file containing the sorted entries. |
36 | static char redirector_sorted[MAXLEN]=""; | |
d6e703cc | 37 | |
bca2fdfd | 38 | static void parse_log(FILE *fp_ou,char *buf) |
491b862f | 39 | { |
9bd92830 FM |
40 | char leks[5], sep[2], res[MAXLEN]; |
41 | char hour[15]; | |
42 | char source[128], list[128]; | |
0a6722a1 FM |
43 | char full_url[MAX_URL_LEN]; |
44 | const char *url; | |
9bd92830 | 45 | char user[MAX_USER_LEN]; |
ad4353be | 46 | char ip[45]; |
9bd92830 FM |
47 | long long int lmon, lday, lyear; |
48 | int mon, day, year; | |
49 | int idata=0; | |
9bd92830 FM |
50 | bool id_is_ip; |
51 | struct getwordstruct gwarea; | |
52 | struct getwordstruct gwarea1; | |
53 | struct userinfostruct *uinfo; | |
bca2fdfd FM |
54 | |
55 | getword_start(&gwarea,buf); | |
56 | if(RedirectorLogFormat[0] != '\0') { | |
57 | getword_start(&gwarea1,RedirectorLogFormat); | |
58 | leks[0]='\0'; | |
59 | if (getword(leks,sizeof(leks),&gwarea1,'#')<0) { | |
60 | debuga(_("Invalid \"redirector_log_format\" option in your sarg.conf (too many characters before first tag)\n")); | |
61 | exit(EXIT_FAILURE); | |
62 | } | |
63 | year=0; | |
64 | mon=0; | |
65 | day=0; | |
66 | hour[0]='\0'; | |
67 | source[0]='\0'; | |
68 | list[0]='\0'; | |
69 | ip[0]='\0'; | |
70 | user[0]='\0'; | |
71 | full_url[0]='\0'; | |
72 | while(strcmp(leks,"end") != 0) { | |
73 | if (getword(leks,sizeof(leks),&gwarea1,'#')<0) { | |
74 | debuga(_("Invalid \"redirector_log_format\" option in your sarg.conf (missing # at end of tag)\n")); | |
75 | exit(EXIT_FAILURE); | |
76 | } | |
77 | if (getword(sep,sizeof(sep),&gwarea1,'#')<0) { | |
78 | debuga(_("Invalid \"redirector_log_format\" option in your sarg.conf (too many characters in column separator)\n")); | |
79 | exit(EXIT_FAILURE); | |
80 | } | |
81 | if(strcmp(leks,"end") != 0) { | |
82 | if (getword_limit(res,sizeof(res),&gwarea,sep[0])<0) { | |
83 | debuga(_("Parsing of tag \"%s\" in redirector log %s returned no result\n"),leks,wentp); | |
84 | RedirectorErrors++; | |
85 | return; | |
86 | } | |
87 | if(strcmp(leks,"year") == 0) { | |
88 | year=atoi(res); | |
89 | } else if(strcmp(leks,"mon") == 0) { | |
90 | mon=atoi(res); | |
91 | } else if(strcmp(leks,"day") == 0) { | |
92 | day=atoi(res); | |
93 | } else if(strcmp(leks,"hour") == 0) { | |
94 | if (strlen(res)>=sizeof(hour)) { | |
95 | debuga(_("Hour string too long in redirector log file %s\n"),wentp); | |
96 | RedirectorErrors++; | |
97 | return; | |
98 | } | |
99 | strcpy(hour,res); | |
100 | } else if(strcmp(leks,"source") == 0) { | |
101 | if (strlen(res)>=sizeof(source)) { | |
102 | debuga(_("Banning source name too long in redirector log file %s\n"),wentp); | |
103 | RedirectorErrors++; | |
104 | return; | |
105 | } | |
106 | strcpy(source,res); | |
107 | } else if(strcmp(leks,"list") == 0) { | |
108 | if (strlen(res)>=sizeof(list)) { | |
109 | debuga(_("Banning list name too long in redirector log file %s\n"),wentp); | |
110 | RedirectorErrors++; | |
111 | return; | |
112 | } | |
113 | strcpy(list,res); | |
114 | } else if(strcmp(leks,"ip") == 0) { | |
115 | if (strlen(res)>=sizeof(ip)) { | |
116 | debuga(_("IP address too long in redirector log file %s\n"),wentp); | |
117 | RedirectorErrors++; | |
118 | return; | |
119 | } | |
120 | strcpy(ip,res); | |
121 | } else if(strcmp(leks,"user") == 0) { | |
122 | if (strlen(res)>=sizeof(user)) { | |
123 | debuga(_("User ID too long in redirector log file %s\n"),wentp); | |
124 | RedirectorErrors++; | |
125 | return; | |
126 | } | |
127 | strcpy(user,res); | |
128 | } else if(strcmp(leks,"url") == 0) { | |
d19124ac FM |
129 | /* |
130 | * Don't worry about the url being truncated as we only keep the host name | |
131 | * any way... | |
132 | */ | |
133 | safe_strcpy(full_url,res,sizeof(full_url)); | |
bca2fdfd FM |
134 | } |
135 | } | |
136 | } | |
137 | } else { | |
138 | if (getword_atoll(&lyear,&gwarea,'-')<0 || getword_atoll(&lmon,&gwarea,'-')<0 || | |
139 | getword_atoll(&lday,&gwarea,' ')<0) { | |
140 | debuga(_("Invalid date found in file %s\n"),wentp); | |
141 | RedirectorErrors++; | |
142 | return; | |
143 | } | |
144 | year=(int)lyear; | |
145 | mon=(int)lmon; | |
146 | day=(int)lday; | |
147 | if (getword(hour,sizeof(hour),&gwarea,' ')<0) { | |
148 | debuga(_("Invalid time found in file %s\n"),wentp); | |
149 | RedirectorErrors++; | |
150 | return; | |
151 | } | |
152 | if (getword_skip(MAXLEN,&gwarea,'(')<0 || getword(source,sizeof(source),&gwarea,'/')<0) { | |
153 | debuga(_("Invalid redirected source in file %s\n"),wentp); | |
154 | RedirectorErrors++; | |
155 | return; | |
156 | } | |
157 | if (getword(list,sizeof(list),&gwarea,'/')<0) { | |
158 | debuga(_("Invalid redirected list in file %s\n"),wentp); | |
159 | RedirectorErrors++; | |
160 | return; | |
161 | } | |
162 | if (getword_skip(MAXLEN,&gwarea,' ')<0 || getword_limit(full_url,sizeof(full_url),&gwarea,' ')<0) { | |
163 | debuga(_("Invalid URL in file %s\n"),wentp); | |
164 | RedirectorErrors++; | |
165 | return; | |
166 | } | |
167 | if (getword(ip,sizeof(ip),&gwarea,'/')<0) { | |
168 | debuga(_("Invalid source IP in file %s\n"),wentp); | |
169 | RedirectorErrors++; | |
170 | return; | |
171 | } | |
172 | if (getword_skip(MAXLEN,&gwarea,' ')<0 || getword(user,sizeof(user),&gwarea,' ')<0) { | |
173 | debuga(_("Invalid user in file %s\n"),wentp); | |
174 | RedirectorErrors++; | |
175 | return; | |
176 | } | |
177 | } | |
178 | url=process_url(full_url,false); | |
179 | ||
180 | //sprintf(warea,"%04d%02d%02d",year,mon,day); | |
181 | ||
182 | if(RedirectorFilterOutDate) { | |
183 | idata = year*10000+mon*100+day; | |
184 | if(idata < dfrom || idata > duntil) | |
185 | return; | |
186 | } | |
187 | ||
188 | if(UserIp) { | |
189 | strcpy(user,ip); | |
190 | id_is_ip=true; | |
191 | } else { | |
192 | id_is_ip=false; | |
81a022d8 | 193 | if (user[0]=='\0' || (user[1]=='\0' && (user[0]=='-' || user[0]==' '))) { |
bca2fdfd FM |
194 | if(RecordsWithoutUser == RECORDWITHOUTUSER_IP) { |
195 | strcpy(user,ip); | |
196 | id_is_ip=true; | |
197 | } | |
198 | if(RecordsWithoutUser == RECORDWITHOUTUSER_IGNORE) | |
199 | return; | |
200 | if(RecordsWithoutUser == RECORDWITHOUTUSER_EVERYBODY) | |
201 | strcpy(user,"everybody"); | |
202 | } | |
203 | } | |
204 | uinfo=userinfo_find_from_id(user); | |
205 | if (!uinfo) { | |
206 | uinfo=userinfo_create(user); | |
207 | uinfo->id_is_ip=id_is_ip; | |
208 | uinfo->no_report=true; | |
209 | if(Ip2Name && id_is_ip) ip2name(user,sizeof(user)); | |
210 | user_find(uinfo->label,MAX_USER_LEN, user); | |
211 | } | |
212 | fprintf(fp_ou,"%s\t%04d%02d%02d\t%s\t%s\t%s\t",uinfo->id,year,mon,day,hour,ip,url); | |
213 | if (source[0] && list[0]) | |
214 | fprintf(fp_ou,"%s/%s\n",source,list); | |
215 | else if (source[0]) | |
216 | fprintf(fp_ou,"%s\n",source); | |
217 | else | |
218 | fprintf(fp_ou,"%s\n",list); | |
219 | redirector_count++; | |
220 | } | |
221 | ||
222 | static void read_log(const char *wentp, FILE *fp_ou,int dfrom,int duntil) | |
223 | { | |
224 | FILE *fp_in = NULL; | |
225 | char *buf; | |
226 | int i; | |
9bd92830 | 227 | longline line; |
491b862f | 228 | |
9bd92830 FM |
229 | if(debug) { |
230 | debuga(_("Reading redirector log file %s\n"),wentp); | |
231 | } | |
d6e703cc | 232 | |
9bd92830 FM |
233 | /* With squidGuard, you can log groups in only one log file. |
234 | We must parse each log files only one time. Example : | |
235 | dest porn { | |
236 | domainlist porn/domains | |
237 | urllist porn/urls | |
238 | log file1.log | |
239 | } | |
240 | dest aggressive { | |
241 | domainlist aggressive/domains | |
242 | urllist aggressive/urls | |
243 | log file2.log | |
244 | } | |
245 | dest audio-video { | |
246 | domainlist audio-video/domains | |
247 | urllist audio-video/urls | |
248 | log file1.log | |
249 | } | |
250 | */ | |
251 | for (i=0; i<nfiles_done; i++) | |
252 | if (!strcmp(wentp, files_done[i])) return; | |
06e3cc62 | 253 | |
9bd92830 FM |
254 | nfiles_done++; |
255 | files_done = realloc(files_done, nfiles_done*sizeof(char *)); | |
256 | if (!files_done) { | |
257 | debuga(_("Not enough memory to store the name of the new redirector log to be read - %s\n"),strerror(errno)); | |
258 | exit(EXIT_FAILURE); | |
259 | } | |
260 | files_done[nfiles_done-1] = strdup(wentp); | |
261 | if (!files_done[nfiles_done-1]) { | |
262 | debuga(_("Not enough memory to store the name of the new redirector log to be read - %s\n"),strerror(errno)); | |
263 | exit(EXIT_FAILURE); | |
264 | } | |
d6e703cc | 265 | |
9bd92830 | 266 | if ((fp_in=fopen(wentp,"r"))==NULL) { |
d6f0349d | 267 | debuga(_("(squidguard) Cannot open log file %s: %s\n"),wentp,strerror(errno)); |
9bd92830 FM |
268 | exit(EXIT_FAILURE); |
269 | } | |
06e3cc62 | 270 | |
9bd92830 FM |
271 | if ((line=longline_create())==NULL) { |
272 | debuga(_("Not enough memory to read the redirector log\n")); | |
273 | exit(EXIT_FAILURE); | |
274 | } | |
2d4c92a1 | 275 | |
9bd92830 | 276 | while ((buf=longline_read(fp_in,line)) != NULL) { |
bca2fdfd | 277 | parse_log(fp_ou,buf); |
9bd92830 FM |
278 | } |
279 | fclose(fp_in); | |
280 | longline_destroy(&line); | |
281 | return; | |
491b862f GS |
282 | } |
283 | ||
284 | ||
330b1c52 | 285 | void redirector_log(void) |
25697a35 | 286 | { |
9bd92830 FM |
287 | FILE *fp_ou = NULL, *fp_guard = NULL; |
288 | char buf[MAXLEN]; | |
289 | char guard_in[MAXLEN]; | |
9bd92830 FM |
290 | char logdir[MAXLEN]; |
291 | char user[MAXLEN]; | |
292 | char tmp6[MAXLEN]; | |
293 | int i; | |
294 | int y; | |
295 | int cstatus; | |
296 | int dfrom, duntil; | |
297 | char *str; | |
298 | char *str2; | |
25697a35 | 299 | |
9bd92830 | 300 | str2 = user; |
d6e703cc | 301 | |
9f93fec3 FM |
302 | if(SquidGuardConf[0] == '\0' && NRedirectorLogs == 0) { |
303 | if (debugz) debugaz(_("No redirector logs provided to produce that kind of report\n")); | |
007905af | 304 | return; |
9f93fec3 | 305 | } |
25697a35 | 306 | |
c98d6a0f | 307 | snprintf(guard_in,sizeof(guard_in),"%s/redirector.int_unsort",tmp); |
cf1a88b9 | 308 | if((fp_ou=fopen(guard_in,"w"))==NULL) { |
d6f0349d | 309 | debuga(_("(squidguard) Cannot open log file %s: %s\n"),guard_in,strerror(errno)); |
9bd92830 FM |
310 | exit(EXIT_FAILURE); |
311 | } | |
25697a35 | 312 | |
9bd92830 FM |
313 | dfrom=(period.start.tm_year+1900)*10000+(period.start.tm_mon+1)*100+period.start.tm_mday; |
314 | duntil=(period.end.tm_year+1900)*10000+(period.end.tm_mon+1)*100+period.end.tm_mday; | |
25697a35 | 315 | |
9bd92830 FM |
316 | if (NRedirectorLogs>0) { |
317 | for (i=0 ; i<NRedirectorLogs ; i++) | |
318 | read_log(RedirectorLogs[i],fp_ou,dfrom,duntil); | |
319 | } else { | |
320 | if(access(SquidGuardConf, R_OK) != 0) { | |
321 | debuga(_("Cannot open squidGuard config file: %s\n"),SquidGuardConf); | |
322 | exit(EXIT_FAILURE); | |
323 | } | |
25697a35 | 324 | |
9bd92830 | 325 | if((fp_guard=fopen(SquidGuardConf,"r"))==NULL) { |
d6f0349d | 326 | debuga(_("(squidguard) Cannot open log file %s: %s\n"),SquidGuardConf,strerror(errno)); |
9bd92830 FM |
327 | exit(EXIT_FAILURE); |
328 | } | |
5f3cfd1d | 329 | |
9bd92830 FM |
330 | logdir[0]=0; |
331 | while(fgets(buf,sizeof(buf),fp_guard)!=NULL) { | |
332 | fixendofline(buf); | |
333 | if((str=get_param_value("logdir",buf))!=NULL) { | |
334 | /* | |
335 | We want to tolerate spaces inside the directory name but we must also | |
336 | remove the trailing spaces left by the editor after the directory name. | |
337 | This should not be a problem as nobody use a file name with trailing spaces. | |
338 | */ | |
339 | for (y=strlen(str)-1 ; y>=0 && (unsigned char)str[y]<=' ' ; y--); | |
340 | if (y>=sizeof(logdir)-1) y=sizeof(logdir)-2; | |
341 | logdir[y+1] = '\0'; | |
342 | while (y>=0) { | |
343 | logdir[y] = str[y]; | |
344 | y--; | |
345 | } | |
346 | } else if((str=get_param_value("log",buf))!=NULL) { | |
347 | if((str2=get_param_value("anonymous",str))!=NULL) | |
348 | str=str2; | |
d6e703cc | 349 | |
9bd92830 FM |
350 | /* |
351 | If logdir is defined, we prepend it to the log file name, otherwise, we assume | |
352 | the log directive provides an absolute file name to the log file. Therefore, | |
353 | we don't need to add an additionnal / at the beginning of the log file name. | |
354 | */ | |
355 | y=(logdir[0]) ? sprintf(wentp,"%s/",logdir) : 0; | |
356 | /* | |
357 | Spaces are allowed in the name of the log file. The file name ends at the first # | |
358 | because it is assumed it is an end of line comment. Any space before the # is then | |
359 | removed. Any control character (i.e. a character with a code lower than 32) ends | |
360 | the file name. That includes the terminating zero. | |
361 | */ | |
362 | while((unsigned char)*str>=' ' && *str!='#' && y<sizeof(wentp)-1) | |
363 | wentp[y++]=*str++; | |
364 | if(*str=='#') { | |
365 | str--; | |
366 | while(*str==' ' && y>0) { | |
367 | str--; | |
368 | y--; | |
369 | } | |
370 | } | |
371 | wentp[y]=0; | |
372 | read_log(wentp,fp_ou,dfrom,duntil); | |
373 | } | |
374 | } | |
375 | } | |
491b862f | 376 | |
9bd92830 | 377 | if (fp_guard) fclose(fp_guard); |
507460ae FM |
378 | if (fp_ou && fclose(fp_ou)==EOF) { |
379 | debuga(_("Write error in %s: %s\n"),guard_in,strerror(errno)); | |
380 | exit(EXIT_FAILURE); | |
381 | } | |
491b862f | 382 | |
9bd92830 FM |
383 | if (files_done) { |
384 | for (y=0; y<nfiles_done; y++) | |
385 | if (files_done[y]) free(files_done[y]); | |
386 | free(files_done); | |
387 | } | |
c274f011 | 388 | |
cf1a88b9 FM |
389 | if (redirector_count) { |
390 | snprintf(redirector_sorted,sizeof(redirector_sorted),"%s/redirector.int_log",tmp); | |
391 | if(debug) { | |
392 | debuga(_("Sorting file: %s\n"),redirector_sorted); | |
393 | } | |
25697a35 | 394 | |
cf1a88b9 FM |
395 | if (snprintf(tmp6,sizeof(tmp6),"sort -t \"\t\" -k 1,1 -k 2,2 -k 4,4 \"%s\" -o \"%s\"",guard_in, redirector_sorted)>=sizeof(tmp6)) { |
396 | debuga(_("Sort command too long when sorting file \"%s\" to \"%s\"\n"),guard_in,redirector_sorted); | |
397 | exit(EXIT_FAILURE); | |
398 | } | |
399 | cstatus=system(tmp6); | |
400 | if (!WIFEXITED(cstatus) || WEXITSTATUS(cstatus)) { | |
401 | debuga(_("sort command return status %d\n"),WEXITSTATUS(cstatus)); | |
402 | debuga(_("sort command: %s\n"),tmp6); | |
403 | exit(EXIT_FAILURE); | |
404 | } | |
9bd92830 | 405 | } |
491b862f | 406 | |
11767c6a FM |
407 | if (!KeepTempLog && unlink(guard_in)) { |
408 | debuga(_("Cannot delete \"%s\": %s\n"),guard_in,strerror(errno)); | |
08f9b029 FM |
409 | exit(EXIT_FAILURE); |
410 | } | |
9bd92830 | 411 | return; |
25697a35 | 412 | } |
330b1c52 | 413 | |
7ae50eee FM |
414 | static void show_ignored_redirector(FILE *fp_ou,int count) |
415 | { | |
416 | char ignored[80]; | |
417 | ||
418 | snprintf(ignored,sizeof(ignored),ngettext("%d more redirector entry not shown here…","%d more redirector entries not shown here…",count),count); | |
419 | fprintf(fp_ou,"<tr><td class=\"data\"></td><td class=\"data\"></td><td class=\"data\"></td><td class=\"data2 more\">%s</td><td class=\"data\"></td></tr>\n",ignored); | |
420 | } | |
421 | ||
330b1c52 FM |
422 | void redirector_report(void) |
423 | { | |
424 | FILE *fp_in = NULL, *fp_ou = NULL; | |
425 | ||
426 | char *buf; | |
427 | char *url; | |
330b1c52 FM |
428 | char report[MAXLEN]; |
429 | char ip[45]; | |
430 | char rule[255]; | |
431 | char oip[45]; | |
432 | char user[MAXLEN]; | |
433 | char ouser[MAXLEN]; | |
434 | char data[15]; | |
435 | char hora[15]; | |
436 | char ouser2[255]; | |
437 | char oname[MAXLEN]; | |
438 | bool z=false; | |
439 | int count=0; | |
440 | long long int data2; | |
441 | bool new_user; | |
442 | struct getwordstruct gwarea; | |
443 | const struct userinfostruct *uinfo; | |
444 | struct tm t; | |
445 | longline line; | |
446 | ||
447 | ouser[0]='\0'; | |
448 | ouser2[0]='\0'; | |
449 | ||
330b1c52 | 450 | if(!redirector_count) { |
cf1a88b9 FM |
451 | if (debugz) { |
452 | if (redirector_sorted[0]) | |
453 | debugaz(_("Redirector report not generated because it is empty\n")); | |
454 | } | |
330b1c52 FM |
455 | return; |
456 | } | |
457 | ||
458 | snprintf(report,sizeof(report),"%s/redirector.html",outdirname); | |
459 | ||
cf1a88b9 | 460 | if((fp_in=fopen(redirector_sorted,"r"))==NULL) { |
d6f0349d | 461 | debuga(_("(squidguard) Cannot open log file %s: %s\n"),redirector_sorted,strerror(errno)); |
330b1c52 FM |
462 | exit(EXIT_FAILURE); |
463 | } | |
464 | ||
465 | if((fp_ou=fopen(report,"w"))==NULL) { | |
d6f0349d | 466 | debuga(_("(squidguard) Cannot open log file %s: %s\n"),report,strerror(errno)); |
330b1c52 FM |
467 | exit(EXIT_FAILURE); |
468 | } | |
469 | ||
470 | if ((line=longline_create())==NULL) { | |
471 | debuga(_("Not enough memory to read the processed redirector log\n")); | |
472 | exit(EXIT_FAILURE); | |
473 | } | |
474 | ||
475 | write_html_header(fp_ou,(IndexTree == INDEX_TREE_DATE) ? 3 : 1,_("Redirector report"),HTML_JS_NONE); | |
476 | fputs("<tr><td class=\"header_c\">",fp_ou); | |
477 | fprintf(fp_ou,_("Period: %s"),period.html); | |
478 | fputs("</td></tr>\n",fp_ou); | |
479 | fprintf(fp_ou,"<tr><th class=\"header_c\">%s</th></tr>\n",_("Redirector report")); | |
480 | close_html_header(fp_ou); | |
481 | ||
482 | fputs("<div class=\"report\"><table cellpadding=1 cellspacing=2>\n",fp_ou); | |
483 | fprintf(fp_ou,"<tr><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th></tr>\n",_("USERID"),_("IP/NAME"),_("DATE/TIME"),_("ACCESSED SITE"),_("RULE")); | |
484 | ||
485 | while((buf=longline_read(fp_in,line))!=NULL) { | |
486 | getword_start(&gwarea,buf); | |
487 | if (getword(user,sizeof(user),&gwarea,'\t')<0) { | |
cf1a88b9 | 488 | debuga(_("Invalid user in file %s\n"),redirector_sorted); |
330b1c52 FM |
489 | exit(EXIT_FAILURE); |
490 | } | |
491 | if (getword_atoll(&data2,&gwarea,'\t')<0) { | |
cf1a88b9 | 492 | debuga(_("Invalid date in file %s\n"),redirector_sorted); |
330b1c52 FM |
493 | exit(EXIT_FAILURE); |
494 | } | |
495 | if (getword(hora,sizeof(hora),&gwarea,'\t')<0) { | |
cf1a88b9 | 496 | debuga(_("Invalid time in file %s\n"),redirector_sorted); |
330b1c52 FM |
497 | exit(EXIT_FAILURE); |
498 | } | |
499 | if (getword(ip,sizeof(ip),&gwarea,'\t')<0) { | |
cf1a88b9 | 500 | debuga(_("Invalid IP address in file %s\n"),redirector_sorted); |
330b1c52 FM |
501 | exit(EXIT_FAILURE); |
502 | } | |
503 | if (getword_ptr(buf,&url,&gwarea,'\t')<0) { | |
cf1a88b9 | 504 | debuga(_("Invalid URL in file %s\n"),redirector_sorted); |
330b1c52 FM |
505 | exit(EXIT_FAILURE); |
506 | } | |
507 | if (getword(rule,sizeof(rule),&gwarea,'\n')<0) { | |
cf1a88b9 | 508 | debuga(_("Invalid rule in file %s\n"),redirector_sorted); |
330b1c52 FM |
509 | exit(EXIT_FAILURE); |
510 | } | |
511 | ||
512 | uinfo=userinfo_find_from_id(user); | |
513 | if (!uinfo) { | |
cf1a88b9 | 514 | debuga(_("Unknown user ID %s in file %s\n"),user,redirector_sorted); |
330b1c52 FM |
515 | exit(EXIT_FAILURE); |
516 | } | |
517 | ||
518 | computedate(data2/10000,(data2/100)%10,data2%100,&t); | |
519 | strftime(data,sizeof(data),"%x",&t); | |
520 | ||
521 | new_user=false; | |
522 | if(!z) { | |
523 | strcpy(ouser,user); | |
524 | strcpy(oip,ip); | |
525 | strcpy(oname,ip); | |
526 | if (Ip2Name && !uinfo->id_is_ip) ip2name(oname,sizeof(oname)); | |
527 | z=true; | |
528 | new_user=true; | |
529 | } else { | |
530 | if(strcmp(ouser,user) != 0) { | |
531 | strcpy(ouser,user); | |
532 | new_user=true; | |
533 | } | |
534 | if(strcmp(oip,ip) != 0) { | |
535 | strcpy(oip,ip); | |
536 | strcpy(oname,ip); | |
537 | if (Ip2Name && !uinfo->id_is_ip) ip2name(oname,sizeof(oname)); | |
538 | new_user=true; | |
539 | } | |
540 | } | |
541 | ||
542 | if(SquidGuardReportLimit) { | |
543 | if(strcmp(ouser2,uinfo->label) == 0) { | |
544 | count++; | |
545 | } else { | |
7ae50eee FM |
546 | if(count>SquidGuardReportLimit && SquidGuardReportLimit>0) |
547 | show_ignored_redirector(fp_ou,count-SquidGuardReportLimit); | |
330b1c52 FM |
548 | count=1; |
549 | strcpy(ouser2,uinfo->label); | |
550 | } | |
7ae50eee | 551 | if(count > SquidGuardReportLimit) |
330b1c52 FM |
552 | continue; |
553 | } | |
554 | ||
555 | if (new_user) | |
556 | fprintf(fp_ou,"<tr><td class=\"data2\">%s</td><td class=\"data2\">%s</td>",uinfo->label,ip); | |
557 | else | |
558 | fputs("<tr><td class=\"data2\"></td><td class=\"data2\"></td>",fp_ou); | |
559 | fprintf(fp_ou,"<td class=\"data2\">%s-%s</td><td class=\"data2\">",data,hora); | |
6fa33a32 | 560 | output_html_link(fp_ou,url,100); |
330b1c52 FM |
561 | fprintf(fp_ou,"</td><td class=\"data2\">%s</td></tr>\n",rule); |
562 | } | |
563 | fclose(fp_in); | |
564 | longline_destroy(&line); | |
565 | ||
7ae50eee FM |
566 | if(count>SquidGuardReportLimit && SquidGuardReportLimit>0) |
567 | show_ignored_redirector(fp_ou,count-SquidGuardReportLimit); | |
568 | ||
bca2fdfd | 569 | fputs("</table>\n",fp_ou); |
bd43d81f | 570 | |
bca2fdfd FM |
571 | if (RedirectorErrors>0) |
572 | { | |
573 | fputs("<div class=\"warn\"><span>",fp_ou); | |
574 | fprintf(fp_ou,ngettext("%d error found in the log file. Some entries may be missing.","%d errors found in the log file. Some entries may be missing.",RedirectorErrors),RedirectorErrors); | |
575 | fputs("</span></div>\n",fp_ou); | |
576 | } | |
bd43d81f | 577 | |
bca2fdfd | 578 | fputs("</div>\n",fp_ou); |
330b1c52 FM |
579 | if (write_html_trailer(fp_ou)<0) |
580 | debuga(_("Write error in file %s\n"),report); | |
507460ae FM |
581 | if (fclose(fp_ou)==EOF) { |
582 | debuga(_("Write error in %s: %s\n"),report,strerror(errno)); | |
583 | exit(EXIT_FAILURE); | |
584 | } | |
330b1c52 | 585 | |
cf1a88b9 FM |
586 | if (!KeepTempLog && unlink(redirector_sorted)) { |
587 | debuga(_("Cannot delete \"%s\": %s\n"),redirector_sorted,strerror(errno)); | |
330b1c52 FM |
588 | exit(EXIT_FAILURE); |
589 | } | |
590 | ||
591 | return; | |
592 | } |