]> git.ipfire.org Git - thirdparty/sarg.git/blobdiff - authfail.c
Add support to decompress xz files
[thirdparty/sarg.git] / authfail.c
index be634698003061b12dde3e584c2a914748feeddd..f0a7fb787fcddbcf0fb10f5ed86119b6c80e8142 100644 (file)
@@ -1,6 +1,6 @@
 /*
  * SARG Squid Analysis Report Generator      http://sarg.sourceforge.net
- *                                                            1998, 2010
+ *                                                            1998, 2015
  *
  * SARG donations:
  *      please look at http://sarg.sourceforge.net/donations.php
 
 #include "include/conf.h"
 #include "include/defs.h"
+#include "include/readlog.h"
+
+//! Name of the file containing the unsorted authentication failure entries.
+static char authfail_unsort[MAXLEN]="";
+//! The file handle to write the entries.
+static FILE *fp_authfail=NULL;
+//! \c True if at least one anthentication failure entry exists.
+static bool authfail_exists=false;
+
+/*!
+Open a file to store the authentication failure.
+
+\return The file handle or NULL if no file is necessary.
+*/
+void authfail_open(void)
+{
+       if ((ReportType & REPORT_TYPE_AUTH_FAILURES) == 0) {
+               if (debugz>=LogLevel_Process) debugaz(__FILE__,__LINE__,_("Authentication failures report not produced as it is not requested\n"));
+               return;
+       }
+       if (Privacy) {
+               if (debugz>=LogLevel_Process) debugaz(__FILE__,__LINE__,_("Authentication failures report not produced because privacy option is active\n"));
+               return;
+       }
+
+       snprintf(authfail_unsort,sizeof(authfail_unsort),"%s/authfail.int_unsort",tmp);
+       if ((fp_authfail=MY_FOPEN(authfail_unsort,"w"))==NULL) {
+               debuga(__FILE__,__LINE__,_("Cannot open file \"%s\": %s\n"),authfail_unsort,strerror(errno));
+               exit(EXIT_FAILURE);
+       }
+       return;
+}
+
+/*!
+Write one entry in the unsorted authentication file file provided that it is required.
+
+\param log_entry The entry to write into the log file.
+*/
+void authfail_write(const struct ReadLogStruct *log_entry)
+{
+       char date[80];
+
+       if (fp_authfail && (strstr(log_entry->HttpCode,"DENIED/401") != 0 || strstr(log_entry->HttpCode,"DENIED/407") != 0)) {
+               strftime(date,sizeof(date),"%d/%m/%Y\t%H:%M:%S",&log_entry->EntryTime);
+               fprintf(fp_authfail, "%s\t%s\t%s\t%s\n",date,log_entry->User,log_entry->Ip,log_entry->Url);
+               authfail_exists=true;
+       }
+}
+
+/*!
+Close the file opened by authfail_open().
+*/
+void authfail_close(void)
+{
+       if (fp_authfail)
+       {
+               if (fclose(fp_authfail)==EOF) {
+                       debuga(__FILE__,__LINE__,_("Write error in \"%s\": %s\n"),authfail_unsort,strerror(errno));
+                       exit(EXIT_FAILURE);
+               }
+               fp_authfail=NULL;
+       }
+}
+
+/*!
+Tell the caller if a authentication failure report exists.
+
+\return \c True if the report is available or \c false if no report
+was generated.
+*/
+bool is_authfail(void)
+{
+       return(authfail_exists);
+}
+
+
+static void show_ignored_auth(FILE *fp_ou,int count)
+{
+       char ignored[80];
+
+       snprintf(ignored,sizeof(ignored),ngettext("%d more authentication failure not shown here…","%d more authentication failures not shown here…",count),count);
+       fprintf(fp_ou,"<tr><td class=\"data\"></td><td class=\"data\"></td><td class=\"data\"></td><td class=\"data2 more\">%s</td></tr>\n",ignored);
+}
 
 void authfail_report(void)
 {
+       FileObject *fp_in = NULL;
+       FILE *fp_ou = NULL;
+
+       char *buf;
+       char *url;
+       char authfail_sort[MAXLEN];
+       char report[MAXLEN];
+       char ip[MAXLEN];
+       char oip[MAXLEN]="";
+       char user[MAXLEN];
+       char ouser[MAXLEN]="";
+       char ouser2[MAXLEN]="";
+       char data[15];
+       char hora[15];
+       char csort[MAXLEN];
+       int z=0;
+       int count=0;
+       int cstatus;
+       int day,month,year;
+       bool new_user;
+       struct getwordstruct gwarea;
+       longline line;
+       struct userinfostruct *uinfo;
+       struct tm t;
+
+       if (!authfail_exists) {
+               if (!KeepTempLog && authfail_unsort[0]!='\0' && unlink(authfail_unsort))
+                       debuga(__FILE__,__LINE__,_("Failed to delete \"%s\": %s\n"),authfail_unsort,strerror(errno));
+
+               authfail_unsort[0]='\0';
+               if (debugz>=LogLevel_Process) debugaz(__FILE__,__LINE__,_("Authentication failures report not produced because it is empty\n"));
+               return;
+       }
+       if (debugz>=LogLevel_Process)
+               debuga(__FILE__,__LINE__,_("Creating authentication failures report...\n"));
+
+       snprintf(authfail_sort,sizeof(authfail_sort),"%s/authfail.int_log",tmp);
+       snprintf(report,sizeof(report),"%s/authfail.html",outdirname);
+
+       snprintf(csort,sizeof(csort),"sort -b -t \"\t\" -T \"%s\" -k 3,3 -k 5,5 -o \"%s\" \"%s\"", tmp, authfail_sort, authfail_unsort);
+       cstatus=system(csort);
+       if (!WIFEXITED(cstatus) || WEXITSTATUS(cstatus)) {
+               debuga(__FILE__,__LINE__,_("sort command return status %d\n"),WEXITSTATUS(cstatus));
+               debuga(__FILE__,__LINE__,_("sort command: %s\n"),csort);
+               exit(EXIT_FAILURE);
+       }
+       if((fp_in=FileObject_Open(authfail_sort))==NULL) {
+               debuga(__FILE__,__LINE__,_("Cannot open file \"%s\": %s\n"),authfail_sort,FileObject_GetLastOpenError());
+               debuga(__FILE__,__LINE__,_("sort command: %s\n"),csort);
+               exit(EXIT_FAILURE);
+       }
+       if (!KeepTempLog && unlink(authfail_unsort)) {
+               debuga(__FILE__,__LINE__,_("Cannot delete \"%s\": %s\n"),authfail_unsort,strerror(errno));
+               exit(EXIT_FAILURE);
+       }
+       authfail_unsort[0]='\0';
+
+       if((fp_ou=MY_FOPEN(report,"w"))==NULL) {
+               debuga(__FILE__,__LINE__,_("Cannot open file \"%s\": %s\n"),report,strerror(errno));
+               exit(EXIT_FAILURE);
+       }
+
+       write_html_header(fp_ou,(IndexTree == INDEX_TREE_DATE) ? 3 : 1,_("Authentication Failures"),HTML_JS_NONE);
+       fputs("<tr><td class=\"header_c\">",fp_ou);
+       fprintf(fp_ou,_("Period: %s"),period.html);
+       fputs("</td></tr>\n",fp_ou);
+       fprintf(fp_ou,"<tr><th class=\"header_c\">%s</th></tr>\n",_("Authentication Failures"));
+       close_html_header(fp_ou);
+
+       fputs("<div class=\"report\"><table cellpadding=\"0\" cellspacing=\"2\">\n",fp_ou);
+       fprintf(fp_ou,"<tr><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th></tr>\n",_("USERID"),_("IP/NAME"),_("DATE/TIME"),_("ACCESSED SITE"));
+
+       if ((line=longline_create())==NULL) {
+               debuga(__FILE__,__LINE__,_("Not enough memory to read file \"%s\"\n"),authfail_sort);
+               exit(EXIT_FAILURE);
+       }
+
+       while((buf=longline_read(fp_in,line))!=NULL) {
+               getword_start(&gwarea,buf);
+               if (getword(data,sizeof(data),&gwarea,'\t')<0) {
+                       debuga(__FILE__,__LINE__,_("Invalid date in file \"%s\"\n"),authfail_sort);
+                       exit(EXIT_FAILURE);
+               }
+               if (getword(hora,sizeof(hora),&gwarea,'\t')<0) {
+                       debuga(__FILE__,__LINE__,_("Invalid time in file \"%s\"\n"),authfail_sort);
+                       exit(EXIT_FAILURE);
+               }
+               if (getword(user,sizeof(user),&gwarea,'\t')<0) {
+                       debuga(__FILE__,__LINE__,_("Invalid user ID in file \"%s\"\n"),authfail_sort);
+                       exit(EXIT_FAILURE);
+               }
+               if (getword(ip,sizeof(ip),&gwarea,'\t')<0) {
+                       debuga(__FILE__,__LINE__,_("Invalid IP address in file \"%s\"\n"),authfail_sort);
+                       exit(EXIT_FAILURE);
+               }
+               if (getword_ptr(buf,&url,&gwarea,'\t')<0) {
+                       debuga(__FILE__,__LINE__,_("Invalid url in file \"%s\"\n"),authfail_sort);
+                       exit(EXIT_FAILURE);
+               }
+               if (sscanf(data,"%d/%d/%d",&day,&month,&year)!=3) continue;
+               computedate(year,month,day,&t);
+               strftime(data,sizeof(data),"%x",&t);
 
-   FILE *fp_in = NULL, *fp_ou = NULL;
-
-   char *buf;
-   char *url;
-   char authfail_in[MAXLEN];
-   char report[MAXLEN];
-   char ip[MAXLEN];
-   char oip[MAXLEN];
-   char user[MAXLEN];
-   char ouser[MAXLEN];
-   char ouser2[MAXLEN];
-   char data[15];
-   char hora[15];
-   char tmp4[MAXLEN];
-   char csort[MAXLEN];
-   int  z=0;
-   int  count=0;
-   int  cstatus;
-   int day,month,year;
-   bool new_user;
-   struct getwordstruct gwarea;
-   longline line;
-   struct userinfostruct *uinfo;
-   struct tm t;
-
-   if(DataFile[0] != '\0') return;
-
-   ouser[0]='\0';
-   ouser2[0]='\0';
-   oip[0]='\0';
-
-   snprintf(tmp4,sizeof(tmp4),"%s/authfail.log.unsort",tmp);
-
-   if(authfail_count == 0) {
-      unlink(tmp4);
-      return;
-   }
-
-   snprintf(authfail_in,sizeof(authfail_in),"%s/authfail.log",tmp);
-   snprintf(report,sizeof(report),"%s/authfail.html",outdirname);
-
-   snprintf(csort,sizeof(csort),"sort -b -T \"%s\" -k 3,3 -k 5,5 -o \"%s\" \"%s\"", tmp, authfail_in, tmp4);
-   cstatus=system(csort);
-   if (!WIFEXITED(cstatus) || WEXITSTATUS(cstatus)) {
-      debuga(_("sort command return status %d\n"),WEXITSTATUS(cstatus));
-      debuga(_("sort command: %s\n"),csort);
-      exit(EXIT_FAILURE);
-   }
-   if((fp_in=MY_FOPEN(authfail_in,"r"))==NULL) {
-      debuga(_("(authfail) Cannot open file %s\n"),authfail_in);
-      debuga(_("sort command: %s\n"),csort);
-      exit(EXIT_FAILURE);
-   }
-   unlink(tmp4);
-
-   if((fp_ou=MY_FOPEN(report,"w"))==NULL) {
-     debuga(_("(authfail) Cannot open file %s\n"),report);
-     exit(EXIT_FAILURE);
-   }
-
-   write_html_header(fp_ou,(IndexTree == INDEX_TREE_DATE) ? 3 : 1,_("Authentication Failures"),HTML_JS_NONE);
-   fputs("<tr><td class=\"header_c\">",fp_ou);
-   fprintf(fp_ou,_("Period: %s"),period.html);
-   fputs("</td></tr>\n",fp_ou);
-   fprintf(fp_ou,"<tr><th class=\"header_c\">%s</th></tr>\n",_("Authentication Failures"));
-   close_html_header(fp_ou);
-
-   fputs("<div class=\"report\"><table cellpadding=\"0\" cellspacing=\"2\">\n",fp_ou);
-   fprintf(fp_ou,"<tr><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th><th class=\"header_l\">%s</th></tr>\n",_("USERID"),_("IP/NAME"),_("DATE/TIME"),_("ACCESSED SITE"));
-
-   if ((line=longline_create())==NULL) {
-      debuga(_("Not enough memory to read file %s\n"),authfail_in);
-      exit(EXIT_FAILURE);
-   }
-
-   while((buf=longline_read(fp_in,line))!=NULL) {
-      getword_start(&gwarea,buf);
-      if (getword(data,sizeof(data),&gwarea,'\t')<0) {
-         debuga(_("There is a broken date in file %s\n"),authfail_in);
-         exit(EXIT_FAILURE);
-      }
-      if (getword(hora,sizeof(hora),&gwarea,'\t')<0) {
-         debuga(_("There is a broken time in file %s\n"),authfail_in);
-         exit(EXIT_FAILURE);
-      }
-      if (getword(user,sizeof(user),&gwarea,'\t')<0) {
-         debuga(_("There is a broken user ID in file %s\n"),authfail_in);
-         exit(EXIT_FAILURE);
-      }
-      if (getword(ip,sizeof(ip),&gwarea,'\t')<0) {
-         debuga(_("There is a broken IP address in file %s\n"),authfail_in);
-         exit(EXIT_FAILURE);
-      }
-      if (getword_ptr(buf,&url,&gwarea,'\t')<0) {
-         debuga(_("There is a broken url in file %s\n"),authfail_in);
-         exit(EXIT_FAILURE);
-      }
-      if (sscanf(data,"%d/%d/%d",&day,&month,&year)!=3) continue;
-      computedate(year,month,day,&t);
-      strftime(data,sizeof(data),"%x",&t);
-
-      uinfo=userinfo_find_from_id(user);
-      if (!uinfo) {
-         debuga(_("Unknown user ID %s in file %s\n"),user,authfail_in);
-         exit(EXIT_FAILURE);
-      }
-
-      new_user=false;
-      if(z == 0) {
-         strcpy(ouser,user);
-         strcpy(oip,ip);
-         z++;
-         new_user=true;
-      } else {
-         if(strcmp(ouser,user) != 0) {
-            strcpy(ouser,user);
-            new_user=true;
-         }
-         if(strcmp(oip,ip) != 0) {
-            strcpy(oip,ip);
-            new_user=true;
-         }
-      }
-
-     if(AuthfailReportLimit>0) {
-        if(strcmp(ouser2,uinfo->label) == 0) {
-            count++;
-         } else {
-            count=1;
-            strcpy(ouser2,uinfo->label);
-         }
-         if(count >= AuthfailReportLimit)
-            continue;
-      }
-
-      fputs("<tr>",fp_ou);
-      if (new_user)
-         fprintf(fp_ou,"<td class=\"data2\">%s</td><td class=\"data2\">%s</td>",uinfo->label,ip);
-      else
-         fputs("<td class=\"data2\"></td><td class=\"data2\"></td>",fp_ou);
-      fprintf(fp_ou,"<td class=\"data2\">%s-%s</td><td class=\"data2\">",data,hora);
-      if(BlockIt[0]!='\0') {
-         fprintf(fp_ou,"<a href=\"%s%s?url=",wwwDocumentRoot,BlockIt);
-         output_html_url(fp_ou,url);
-         fputs("\"><img src=\"../images/sarg-squidguard-block.png\"></a>&nbsp;",fp_ou);
-      }
-      fputs("<a href=\"",fp_ou);
-      output_html_url(fp_ou,url);
-      fputs("\">",fp_ou);
-      output_html_string(fp_ou,url,100);
-      fputs("</a></td></th>\n",fp_ou);
-   }
-   fclose(fp_in);
-   longline_destroy(&line);
-
-   fputs("</table></div>\n",fp_ou);
-   if (write_html_trailer(fp_ou)<0)
-      debuga(_("Write error in file %s\n"),report);
-   if (fclose(fp_ou)==EOF)
-      debuga(_("Failed to close file %s - %s\n"),report,strerror(errno));
-
-   unlink(authfail_in);
-
-   return;
+               uinfo=userinfo_find_from_id(user);
+               if (!uinfo) {
+                       debuga(__FILE__,__LINE__,_("Unknown user ID %s in file \"%s\"\n"),user,authfail_sort);
+                       exit(EXIT_FAILURE);
+               }
+
+               new_user=false;
+               if(z == 0) {
+                       strcpy(ouser,user);
+                       strcpy(oip,ip);
+                       z++;
+                       new_user=true;
+               } else {
+                       if(strcmp(ouser,user) != 0) {
+                               strcpy(ouser,user);
+                               new_user=true;
+                       }
+                       if(strcmp(oip,ip) != 0) {
+                               strcpy(oip,ip);
+                               new_user=true;
+                       }
+               }
+
+               if(AuthfailReportLimit>0) {
+                       if(strcmp(ouser2,uinfo->label) == 0) {
+                               count++;
+                       } else {
+                               if(count>AuthfailReportLimit && AuthfailReportLimit>0)
+                                       show_ignored_auth(fp_ou,count-AuthfailReportLimit);
+                               count=1;
+                               strcpy(ouser2,uinfo->label);
+                       }
+                       if(count > AuthfailReportLimit)
+                               continue;
+               }
+
+               fputs("<tr>",fp_ou);
+               if (new_user)
+                       fprintf(fp_ou,"<td class=\"data2\">%s</td><td class=\"data2\">%s</td>",uinfo->label,ip);
+               else
+                       fputs("<td class=\"data2\"></td><td class=\"data2\"></td>",fp_ou);
+               fprintf(fp_ou,"<td class=\"data2\">%s-%s</td><td class=\"data2\">",data,hora);
+               if(BlockIt[0]!='\0' && url[0]!=ALIAS_PREFIX) {
+                       fprintf(fp_ou,"<a href=\"%s%s?url=",wwwDocumentRoot,BlockIt);
+                       output_html_url(fp_ou,url);
+                       fputs("\"><img src=\"../images/sarg-squidguard-block.png\"></a>&nbsp;",fp_ou);
+               }
+               output_html_link(fp_ou,url,100);
+               fputs("</td></th>\n",fp_ou);
+       }
+       if (FileObject_Close(fp_in)) {
+               debuga(__FILE__,__LINE__,_("Read error in \"%s\": %s\n"),authfail_sort,FileObject_GetLastCloseError());
+               exit(EXIT_FAILURE);
+       }
+       longline_destroy(&line);
+
+       if(count>AuthfailReportLimit && AuthfailReportLimit>0)
+               show_ignored_auth(fp_ou,count-AuthfailReportLimit);
+
+       fputs("</table></div>\n",fp_ou);
+       write_html_trailer(fp_ou);
+       if (fclose(fp_ou)==EOF) {
+               debuga(__FILE__,__LINE__,_("Write error in \"%s\": %s\n"),report,strerror(errno));
+               exit(EXIT_FAILURE);
+       }
+
+       if (!KeepTempLog && unlink(authfail_sort)) {
+               debuga(__FILE__,__LINE__,_("Cannot delete \"%s\": %s\n"),authfail_sort,strerror(errno));
+               exit(EXIT_FAILURE);
+       }
+
+       return;
+}
+
+/*!
+Remove any temporary file left by the authfail module.
+*/
+void authfail_cleanup(void)
+{
+       if (fp_authfail) {
+               if (fclose(fp_authfail)==EOF) {
+                       debuga(__FILE__,__LINE__,_("Write error in \"%s\": %s\n"),authfail_unsort,strerror(errno));
+                       exit(EXIT_FAILURE);
+               }
+               fp_authfail=NULL;
+       }
+       if(authfail_unsort[0]) {
+               if (!KeepTempLog && unlink(authfail_unsort)==-1)
+                       debuga(__FILE__,__LINE__,_("Failed to delete \"%s\": %s\n"),authfail_unsort,strerror(errno));
+       }
 }