]> git.ipfire.org Git - thirdparty/sarg.git/blame - authfail.c
Check for the proper creation of a directory
[thirdparty/sarg.git] / authfail.c
CommitLineData
25697a35 1/*
94ff9470 2 * SARG Squid Analysis Report Generator http://sarg.sourceforge.net
1164c474 3 * 1998, 2010
94ff9470
GS
4 *
5 * SARG donations:
6 * please look at http://sarg.sourceforge.net/donations.php
1164c474
FM
7 * Support:
8 * http://sourceforge.net/projects/sarg/forums/forum/363374
25697a35
GS
9 * ---------------------------------------------------------------------
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
15 *
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111, USA.
24 *
25 */
26
27#include "include/conf.h"
5f3cfd1d 28#include "include/defs.h"
25697a35 29
32e71fa4 30void authfail_report(void)
25697a35 31{
9bd92830
FM
32 FILE *fp_in = NULL, *fp_ou = NULL;
33
34 char *buf;
35 char *url;
36 char authfail_in[MAXLEN];
37 char report[MAXLEN];
38 char ip[MAXLEN];
39 char oip[MAXLEN];
40 char user[MAXLEN];
41 char ouser[MAXLEN];
42 char ouser2[MAXLEN];
43 char data[15];
44 char hora[15];
45 char tmp4[MAXLEN];
46 char csort[MAXLEN];
47 int z=0;
48 int count=0;
49 int cstatus;
50 int day,month,year;
51 bool new_user;
52 struct getwordstruct gwarea;
53 longline line;
54 struct userinfostruct *uinfo;
55 struct tm t;
56
57 if(DataFile[0] != '\0') return;
58
59 ouser[0]='\0';
60 ouser2[0]='\0';
61 oip[0]='\0';
62
63 snprintf(tmp4,sizeof(tmp4),"%s/authfail.log.unsort",tmp);
64
65 if(authfail_count == 0) {
66 unlink(tmp4);
67 return;
68 }
69
70 snprintf(authfail_in,sizeof(authfail_in),"%s/authfail.log",tmp);
71 snprintf(report,sizeof(report),"%s/authfail.html",outdirname);
72
73 snprintf(csort,sizeof(csort),"sort -b -T \"%s\" -k 3,3 -k 5,5 -o \"%s\" \"%s\"", tmp, authfail_in, tmp4);
74 cstatus=system(csort);
75 if (!WIFEXITED(cstatus) || WEXITSTATUS(cstatus)) {
76 debuga(_("sort command return status %d\n"),WEXITSTATUS(cstatus));
77 debuga(_("sort command: %s\n"),csort);
78 exit(EXIT_FAILURE);
79 }
80 if((fp_in=MY_FOPEN(authfail_in,"r"))==NULL) {
81 debuga(_("(authfail) Cannot open file %s\n"),authfail_in);
82 debuga(_("sort command: %s\n"),csort);
83 exit(EXIT_FAILURE);
84 }
85 unlink(tmp4);
86
87 if((fp_ou=MY_FOPEN(report,"w"))==NULL) {
007905af
FM
88 debuga(_("(authfail) Cannot open file %s\n"),report);
89 exit(EXIT_FAILURE);
9bd92830
FM
90 }
91
92 write_html_header(fp_ou,(IndexTree == INDEX_TREE_DATE) ? 3 : 1,_("Authentication Failures"),HTML_JS_NONE);
93 fputs("<tr><td class=\"header_c\">",fp_ou);
94 fprintf(fp_ou,_("Period: %s"),period.html);
95 fputs("</td></tr>\n",fp_ou);
96 fprintf(fp_ou,"<tr><th class=\"header_c\">%s</th></tr>\n",_("Authentication Failures"));
97 close_html_header(fp_ou);
98
99 fputs("<div class=\"report\"><table cellpadding=\"0\" cellspacing=\"2\">\n",fp_ou);
100 fprintf(fp_ou,"<tr><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th></tr>\n",_("USERID"),_("IP/NAME"),_("DATE/TIME"),_("ACCESSED SITE"));
101
102 if ((line=longline_create())==NULL) {
103 debuga(_("Not enough memory to read file %s\n"),authfail_in);
104 exit(EXIT_FAILURE);
105 }
106
107 while((buf=longline_read(fp_in,line))!=NULL) {
108 getword_start(&gwarea,buf);
109 if (getword(data,sizeof(data),&gwarea,'\t')<0) {
110 debuga(_("There is a broken date in file %s\n"),authfail_in);
111 exit(EXIT_FAILURE);
112 }
113 if (getword(hora,sizeof(hora),&gwarea,'\t')<0) {
114 debuga(_("There is a broken time in file %s\n"),authfail_in);
115 exit(EXIT_FAILURE);
116 }
117 if (getword(user,sizeof(user),&gwarea,'\t')<0) {
118 debuga(_("There is a broken user ID in file %s\n"),authfail_in);
119 exit(EXIT_FAILURE);
120 }
121 if (getword(ip,sizeof(ip),&gwarea,'\t')<0) {
122 debuga(_("There is a broken IP address in file %s\n"),authfail_in);
123 exit(EXIT_FAILURE);
124 }
125 if (getword_ptr(buf,&url,&gwarea,'\t')<0) {
126 debuga(_("There is a broken url in file %s\n"),authfail_in);
127 exit(EXIT_FAILURE);
128 }
129 if (sscanf(data,"%d/%d/%d",&day,&month,&year)!=3) continue;
130 computedate(year,month,day,&t);
131 strftime(data,sizeof(data),"%x",&t);
132
133 uinfo=userinfo_find_from_id(user);
134 if (!uinfo) {
135 debuga(_("Unknown user ID %s in file %s\n"),user,authfail_in);
136 exit(EXIT_FAILURE);
137 }
138
139 new_user=false;
140 if(z == 0) {
141 strcpy(ouser,user);
142 strcpy(oip,ip);
143 z++;
144 new_user=true;
145 } else {
146 if(strcmp(ouser,user) != 0) {
147 strcpy(ouser,user);
148 new_user=true;
149 }
150 if(strcmp(oip,ip) != 0) {
151 strcpy(oip,ip);
152 new_user=true;
153 }
154 }
155
007905af
FM
156 if(AuthfailReportLimit>0) {
157 if(strcmp(ouser2,uinfo->label) == 0) {
9bd92830
FM
158 count++;
159 } else {
160 count=1;
161 strcpy(ouser2,uinfo->label);
162 }
163 if(count >= AuthfailReportLimit)
164 continue;
165 }
166
167 fputs("<tr>",fp_ou);
168 if (new_user)
169 fprintf(fp_ou,"<td class=\"data2\">%s</td><td class=\"data2\">%s</td>",uinfo->label,ip);
170 else
171 fputs("<td class=\"data2\"></td><td class=\"data2\"></td>",fp_ou);
172 fprintf(fp_ou,"<td class=\"data2\">%s-%s</td><td class=\"data2\">",data,hora);
173 if(BlockIt[0]!='\0') {
174 fprintf(fp_ou,"<a href=\"%s%s?url=",wwwDocumentRoot,BlockIt);
175 output_html_url(fp_ou,url);
176 fputs("\"><img src=\"../images/sarg-squidguard-block.png\"></a>&nbsp;",fp_ou);
177 }
178 fputs("<a href=\"",fp_ou);
179 output_html_url(fp_ou,url);
180 fputs("\">",fp_ou);
181 output_html_string(fp_ou,url,100);
182 fputs("</a></td></th>\n",fp_ou);
183 }
184 fclose(fp_in);
185 longline_destroy(&line);
186
187 fputs("</table></div>\n",fp_ou);
188 if (write_html_trailer(fp_ou)<0)
189 debuga(_("Write error in file %s\n"),report);
190 if (fclose(fp_ou)==EOF)
191 debuga(_("Failed to close file %s - %s\n"),report,strerror(errno));
192
193 unlink(authfail_in);
194
195 return;
25697a35 196}