]> git.ipfire.org Git - thirdparty/sarg.git/blobdiff - authfail.c
Add support to decompress xz files
[thirdparty/sarg.git] / authfail.c
index 601ab8eaa23c6763d373bc5b579869a2c527aa61..f0a7fb787fcddbcf0fb10f5ed86119b6c80e8142 100644 (file)
@@ -1,6 +1,6 @@
 /*
  * SARG Squid Analysis Report Generator      http://sarg.sourceforge.net
- *                                                            1998, 2010
+ *                                                            1998, 2015
  *
  * SARG donations:
  *      please look at http://sarg.sourceforge.net/donations.php
 
 #include "include/conf.h"
 #include "include/defs.h"
+#include "include/readlog.h"
+
+//! Name of the file containing the unsorted authentication failure entries.
+static char authfail_unsort[MAXLEN]="";
+//! The file handle to write the entries.
+static FILE *fp_authfail=NULL;
+//! \c True if at least one anthentication failure entry exists.
+static bool authfail_exists=false;
+
+/*!
+Open a file to store the authentication failure.
+
+\return The file handle or NULL if no file is necessary.
+*/
+void authfail_open(void)
+{
+       if ((ReportType & REPORT_TYPE_AUTH_FAILURES) == 0) {
+               if (debugz>=LogLevel_Process) debugaz(__FILE__,__LINE__,_("Authentication failures report not produced as it is not requested\n"));
+               return;
+       }
+       if (Privacy) {
+               if (debugz>=LogLevel_Process) debugaz(__FILE__,__LINE__,_("Authentication failures report not produced because privacy option is active\n"));
+               return;
+       }
+
+       snprintf(authfail_unsort,sizeof(authfail_unsort),"%s/authfail.int_unsort",tmp);
+       if ((fp_authfail=MY_FOPEN(authfail_unsort,"w"))==NULL) {
+               debuga(__FILE__,__LINE__,_("Cannot open file \"%s\": %s\n"),authfail_unsort,strerror(errno));
+               exit(EXIT_FAILURE);
+       }
+       return;
+}
+
+/*!
+Write one entry in the unsorted authentication file file provided that it is required.
+
+\param log_entry The entry to write into the log file.
+*/
+void authfail_write(const struct ReadLogStruct *log_entry)
+{
+       char date[80];
+
+       if (fp_authfail && (strstr(log_entry->HttpCode,"DENIED/401") != 0 || strstr(log_entry->HttpCode,"DENIED/407") != 0)) {
+               strftime(date,sizeof(date),"%d/%m/%Y\t%H:%M:%S",&log_entry->EntryTime);
+               fprintf(fp_authfail, "%s\t%s\t%s\t%s\n",date,log_entry->User,log_entry->Ip,log_entry->Url);
+               authfail_exists=true;
+       }
+}
+
+/*!
+Close the file opened by authfail_open().
+*/
+void authfail_close(void)
+{
+       if (fp_authfail)
+       {
+               if (fclose(fp_authfail)==EOF) {
+                       debuga(__FILE__,__LINE__,_("Write error in \"%s\": %s\n"),authfail_unsort,strerror(errno));
+                       exit(EXIT_FAILURE);
+               }
+               fp_authfail=NULL;
+       }
+}
+
+/*!
+Tell the caller if a authentication failure report exists.
+
+\return \c True if the report is available or \c false if no report
+was generated.
+*/
+bool is_authfail(void)
+{
+       return(authfail_exists);
+}
+
+
+static void show_ignored_auth(FILE *fp_ou,int count)
+{
+       char ignored[80];
+
+       snprintf(ignored,sizeof(ignored),ngettext("%d more authentication failure not shown here…","%d more authentication failures not shown here…",count),count);
+       fprintf(fp_ou,"<tr><td class=\"data\"></td><td class=\"data\"></td><td class=\"data\"></td><td class=\"data2 more\">%s</td></tr>\n",ignored);
+}
 
 void authfail_report(void)
 {
+       FileObject *fp_in = NULL;
+       FILE *fp_ou = NULL;
+
+       char *buf;
+       char *url;
+       char authfail_sort[MAXLEN];
+       char report[MAXLEN];
+       char ip[MAXLEN];
+       char oip[MAXLEN]="";
+       char user[MAXLEN];
+       char ouser[MAXLEN]="";
+       char ouser2[MAXLEN]="";
+       char data[15];
+       char hora[15];
+       char csort[MAXLEN];
+       int z=0;
+       int count=0;
+       int cstatus;
+       int day,month,year;
+       bool new_user;
+       struct getwordstruct gwarea;
+       longline line;
+       struct userinfostruct *uinfo;
+       struct tm t;
+
+       if (!authfail_exists) {
+               if (!KeepTempLog && authfail_unsort[0]!='\0' && unlink(authfail_unsort))
+                       debuga(__FILE__,__LINE__,_("Failed to delete \"%s\": %s\n"),authfail_unsort,strerror(errno));
+
+               authfail_unsort[0]='\0';
+               if (debugz>=LogLevel_Process) debugaz(__FILE__,__LINE__,_("Authentication failures report not produced because it is empty\n"));
+               return;
+       }
+       if (debugz>=LogLevel_Process)
+               debuga(__FILE__,__LINE__,_("Creating authentication failures report...\n"));
+
+       snprintf(authfail_sort,sizeof(authfail_sort),"%s/authfail.int_log",tmp);
+       snprintf(report,sizeof(report),"%s/authfail.html",outdirname);
+
+       snprintf(csort,sizeof(csort),"sort -b -t \"\t\" -T \"%s\" -k 3,3 -k 5,5 -o \"%s\" \"%s\"", tmp, authfail_sort, authfail_unsort);
+       cstatus=system(csort);
+       if (!WIFEXITED(cstatus) || WEXITSTATUS(cstatus)) {
+               debuga(__FILE__,__LINE__,_("sort command return status %d\n"),WEXITSTATUS(cstatus));
+               debuga(__FILE__,__LINE__,_("sort command: %s\n"),csort);
+               exit(EXIT_FAILURE);
+       }
+       if((fp_in=FileObject_Open(authfail_sort))==NULL) {
+               debuga(__FILE__,__LINE__,_("Cannot open file \"%s\": %s\n"),authfail_sort,FileObject_GetLastOpenError());
+               debuga(__FILE__,__LINE__,_("sort command: %s\n"),csort);
+               exit(EXIT_FAILURE);
+       }
+       if (!KeepTempLog && unlink(authfail_unsort)) {
+               debuga(__FILE__,__LINE__,_("Cannot delete \"%s\": %s\n"),authfail_unsort,strerror(errno));
+               exit(EXIT_FAILURE);
+       }
+       authfail_unsort[0]='\0';
+
+       if((fp_ou=MY_FOPEN(report,"w"))==NULL) {
+               debuga(__FILE__,__LINE__,_("Cannot open file \"%s\": %s\n"),report,strerror(errno));
+               exit(EXIT_FAILURE);
+       }
+
+       write_html_header(fp_ou,(IndexTree == INDEX_TREE_DATE) ? 3 : 1,_("Authentication Failures"),HTML_JS_NONE);
+       fputs("<tr><td class=\"header_c\">",fp_ou);
+       fprintf(fp_ou,_("Period: %s"),period.html);
+       fputs("</td></tr>\n",fp_ou);
+       fprintf(fp_ou,"<tr><th class=\"header_c\">%s</th></tr>\n",_("Authentication Failures"));
+       close_html_header(fp_ou);
+
+       fputs("<div class=\"report\"><table cellpadding=\"0\" cellspacing=\"2\">\n",fp_ou);
+       fprintf(fp_ou,"<tr><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th></tr>\n",_("USERID"),_("IP/NAME"),_("DATE/TIME"),_("ACCESSED SITE"));
+
+       if ((line=longline_create())==NULL) {
+               debuga(__FILE__,__LINE__,_("Not enough memory to read file \"%s\"\n"),authfail_sort);
+               exit(EXIT_FAILURE);
+       }
+
+       while((buf=longline_read(fp_in,line))!=NULL) {
+               getword_start(&gwarea,buf);
+               if (getword(data,sizeof(data),&gwarea,'\t')<0) {
+                       debuga(__FILE__,__LINE__,_("Invalid date in file \"%s\"\n"),authfail_sort);
+                       exit(EXIT_FAILURE);
+               }
+               if (getword(hora,sizeof(hora),&gwarea,'\t')<0) {
+                       debuga(__FILE__,__LINE__,_("Invalid time in file \"%s\"\n"),authfail_sort);
+                       exit(EXIT_FAILURE);
+               }
+               if (getword(user,sizeof(user),&gwarea,'\t')<0) {
+                       debuga(__FILE__,__LINE__,_("Invalid user ID in file \"%s\"\n"),authfail_sort);
+                       exit(EXIT_FAILURE);
+               }
+               if (getword(ip,sizeof(ip),&gwarea,'\t')<0) {
+                       debuga(__FILE__,__LINE__,_("Invalid IP address in file \"%s\"\n"),authfail_sort);
+                       exit(EXIT_FAILURE);
+               }
+               if (getword_ptr(buf,&url,&gwarea,'\t')<0) {
+                       debuga(__FILE__,__LINE__,_("Invalid url in file \"%s\"\n"),authfail_sort);
+                       exit(EXIT_FAILURE);
+               }
+               if (sscanf(data,"%d/%d/%d",&day,&month,&year)!=3) continue;
+               computedate(year,month,day,&t);
+               strftime(data,sizeof(data),"%x",&t);
 
-   FILE *fp_in = NULL, *fp_ou = NULL;
-
-   char url[MAXLEN];
-   char authfail_in[MAXLEN];
-   char per[MAXLEN];
-   char report[MAXLEN];
-   char period[100];
-   char ip[MAXLEN];
-   char oip[MAXLEN];
-   char user[MAXLEN];
-   char ouser[MAXLEN];
-   char ouser2[MAXLEN];
-   char data[15];
-   char hora[15];
-   char *str;
-   int  z=0;
-   int  count=0;
-   int  cstatus;
-   struct getwordstruct gwarea;
-
-   if(DataFile[0] != '\0') return;
-
-   ouser[0]='\0';
-
-   sprintf(tmp4,"%s/sarg/authfail.log.unsort",TempDir);
-
-   if(!authfail_count) {
-      unlink(tmp4);
-      return;
-   }
-
-   sprintf(authfail_in,"%s/authfail.log",TempDir);
-   sprintf(per,"%s/sarg-period",dirname);
-   sprintf(report,"%s/authfail.html",dirname);
-
-   if ((fp_in = fopen(per, "r")) == 0) {
-      fprintf(stderr, "SARG: (authfail) %s: %s\n",text[45],per);
-      exit(1);
-   }
-   if (!fgets(period,sizeof(period),fp_in)) {
-      fprintf(stderr,"SARG: (authfail) read error in %s\n",per);
-      exit(1);
-   }
-   fclose(fp_in);
-
-   sprintf(csort,"sort -b -T \"%s\" -k 3,3 -k 5,5 -o \"%s\" \"%s\"", TempDir, authfail_in, tmp4);
-   cstatus=system(csort);
-   if (!WIFEXITED(cstatus) || WEXITSTATUS(cstatus)) {
-      fprintf(stderr, "SARG: sort command return status %d\n",WEXITSTATUS(cstatus));
-      fprintf(stderr, "SARG: sort command: %s\n",csort);
-      exit(1);
-   }
-   if((fp_in=MY_FOPEN(authfail_in,"r"))==NULL) {
-      fprintf(stderr, "SARG: (authfail) %s: %s\n",text[45],authfail_in);
-      fprintf(stderr, "SARG: sort command: %s\n",csort);
-      exit(1);
-   }
-   unlink(tmp4);
-
-   if((fp_ou=MY_FOPEN(report,"w"))==NULL) {
-     fprintf(stderr, "SARG: (authfail) %s: %s\n",text[45],report);
-     exit(1);
-   }
-
-   fprintf(fp_ou, "<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01 Transitional//EN\" \"http://www.w3.org/TR/html4/loose.dtd\">\n<html>\n<head>\n  <meta http-equiv=\"Content-Type\" content=\"text/html; charset=%s\">\n",CharSet);
-   css(fp_ou);
-   fputs("</head>\n",fp_ou);
-   if(strlen(FontFace) > 0) fprintf(fp_ou,"<font face=%s>\n",FontFace);
-   fprintf(fp_ou,"<body bgcolor=%s text=%s background='%s'>\n",BgColor,TxColor,BgImage);
-   write_logo_image(fp_ou);
-
-   if(IndexTree == INDEX_TREE_DATE)
-      show_sarg(fp_ou, "../../..");
-   else
-      show_sarg(fp_ou,"..");
-   fputs("<div align=\"center\"><table cellpadding=0 cellspacing=0>\n",fp_ou);
-   fprintf(fp_ou,"<tr><th class=\"title\">%s</th></tr>\n",Title);
-
-   fprintf(fp_ou,"<tr><td class=\"header_l\">%s: %s</td></tr>\n",text[89],period);
-   fprintf(fp_ou,"<tr><th class=\"header_c\">%s</th></tr>\n",text[117]);
-   fputs("</table></div>\n",fp_ou);
-
-   fputs("<div align=\"center\"><table cellpadding=\"0\" cellspacing=\"2\">\n",fp_ou);
-   fputs("<tr><td></td></tr>\n",fp_ou);
-   fputs("<tr><td></td></tr>\n",fp_ou);
-   fputs("<tr><td></td></tr>\n",fp_ou);
-   fprintf(fp_ou,"<tr><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th></tr>\n",text[98],text[111],text[110],text[91]);
-
-   while(fgets(buf,sizeof(buf),fp_in)!=NULL) {
-      getword_start(&gwarea,buf);
-      if (getword(data,sizeof(data),&gwarea,'\t')<0 || getword(hora,sizeof(hora),&gwarea,'\t')<0 ||
-          getword(user,sizeof(user),&gwarea,'\t')<0 || getword(ip,sizeof(ip),&gwarea,'\t')<0 ||
-          getword(url,sizeof(url),&gwarea,'\t')<0) {
-         printf("SARG: Maybe you have a broken record or garbage in your %s file.\n",authfail_in);
-         exit(1);
-      }
-
-      if((str=(char *) strstr(user, "_")) != (char *) NULL ) {
-         if((str=(char *) strstr(str+1, "_")) != (char *) NULL )
-            fixip(user);
-      }
-
-      if(Ip2Name)
-         ip2name(ip,sizeof(ip));
-
-      if(!z) {
-         strcpy(ouser,user);
-         strcpy(oip,ip);
-         z++;
-      } else {
-         if(strcmp(ouser,user) == 0)
-            user[0]='\0';
-         if(user[0] != '\0')
-            strcpy(ouser,user);
-         if(strcmp(oip,ip) == 0)
-            ip[0]='\0';
-         if(ip[0] != '\0')
-            strcpy(oip,ip);
-      }
-
-      user_find(name,sizeof(name), user);
-
-      if(dotinuser && strchr(name,'_')) {
-         subs(name,sizeof(name),"_",".");
-      }
-
-     if(AuthfailReportLimit) {
-        if(strcmp(ouser2,name) == 0) {
-            count++;
-         } else {
-            count=1;
-            strcpy(ouser2,name);
-         }
-         if(count >= AuthfailReportLimit)
-            continue;
-      }
-
-      fprintf(fp_ou,"<tr><td class=\"data2\">%s</td><td class=\"data2\">%s</td><td class=\"data2\">%s-%s</td><td class=\"data2\">%s<a href=\"%s\">%s</a></td></th>\n",name,ip,data,hora,BlockImage,url,url);
-   }
-
-   fputs("</table>\n",fp_ou);
-
-   show_info(fp_ou);
-
-   fputs("</body>\n</html>\n",fp_ou);
-
-   fclose(fp_in);
-   fclose(fp_ou);
-
-   unlink(authfail_in);
-
-   return;
+               uinfo=userinfo_find_from_id(user);
+               if (!uinfo) {
+                       debuga(__FILE__,__LINE__,_("Unknown user ID %s in file \"%s\"\n"),user,authfail_sort);
+                       exit(EXIT_FAILURE);
+               }
+
+               new_user=false;
+               if(z == 0) {
+                       strcpy(ouser,user);
+                       strcpy(oip,ip);
+                       z++;
+                       new_user=true;
+               } else {
+                       if(strcmp(ouser,user) != 0) {
+                               strcpy(ouser,user);
+                               new_user=true;
+                       }
+                       if(strcmp(oip,ip) != 0) {
+                               strcpy(oip,ip);
+                               new_user=true;
+                       }
+               }
+
+               if(AuthfailReportLimit>0) {
+                       if(strcmp(ouser2,uinfo->label) == 0) {
+                               count++;
+                       } else {
+                               if(count>AuthfailReportLimit && AuthfailReportLimit>0)
+                                       show_ignored_auth(fp_ou,count-AuthfailReportLimit);
+                               count=1;
+                               strcpy(ouser2,uinfo->label);
+                       }
+                       if(count > AuthfailReportLimit)
+                               continue;
+               }
+
+               fputs("<tr>",fp_ou);
+               if (new_user)
+                       fprintf(fp_ou,"<td class=\"data2\">%s</td><td class=\"data2\">%s</td>",uinfo->label,ip);
+               else
+                       fputs("<td class=\"data2\"></td><td class=\"data2\"></td>",fp_ou);
+               fprintf(fp_ou,"<td class=\"data2\">%s-%s</td><td class=\"data2\">",data,hora);
+               if(BlockIt[0]!='\0' && url[0]!=ALIAS_PREFIX) {
+                       fprintf(fp_ou,"<a href=\"%s%s?url=",wwwDocumentRoot,BlockIt);
+                       output_html_url(fp_ou,url);
+                       fputs("\"><img src=\"../images/sarg-squidguard-block.png\"></a>&nbsp;",fp_ou);
+               }
+               output_html_link(fp_ou,url,100);
+               fputs("</td></th>\n",fp_ou);
+       }
+       if (FileObject_Close(fp_in)) {
+               debuga(__FILE__,__LINE__,_("Read error in \"%s\": %s\n"),authfail_sort,FileObject_GetLastCloseError());
+               exit(EXIT_FAILURE);
+       }
+       longline_destroy(&line);
+
+       if(count>AuthfailReportLimit && AuthfailReportLimit>0)
+               show_ignored_auth(fp_ou,count-AuthfailReportLimit);
+
+       fputs("</table></div>\n",fp_ou);
+       write_html_trailer(fp_ou);
+       if (fclose(fp_ou)==EOF) {
+               debuga(__FILE__,__LINE__,_("Write error in \"%s\": %s\n"),report,strerror(errno));
+               exit(EXIT_FAILURE);
+       }
+
+       if (!KeepTempLog && unlink(authfail_sort)) {
+               debuga(__FILE__,__LINE__,_("Cannot delete \"%s\": %s\n"),authfail_sort,strerror(errno));
+               exit(EXIT_FAILURE);
+       }
+
+       return;
+}
+
+/*!
+Remove any temporary file left by the authfail module.
+*/
+void authfail_cleanup(void)
+{
+       if (fp_authfail) {
+               if (fclose(fp_authfail)==EOF) {
+                       debuga(__FILE__,__LINE__,_("Write error in \"%s\": %s\n"),authfail_unsort,strerror(errno));
+                       exit(EXIT_FAILURE);
+               }
+               fp_authfail=NULL;
+       }
+       if(authfail_unsort[0]) {
+               if (!KeepTempLog && unlink(authfail_unsort)==-1)
+                       debuga(__FILE__,__LINE__,_("Failed to delete \"%s\": %s\n"),authfail_unsort,strerror(errno));
+       }
 }