1 | #!/usr/bin/perl
|
---|
2 | # XMLRPC interface to IPDB search
|
---|
3 | # Copyright (C) 2017 Kris Deugau <kdeugau@deepnet.cx>
|
---|
4 |
|
---|
5 | use strict;
|
---|
6 | use warnings;
|
---|
7 |
|
---|
8 | use DBI;
|
---|
9 | use NetAddr::IP;
|
---|
10 | use FCGI;
|
---|
11 | use Frontier::Responder;
|
---|
12 |
|
---|
13 | use Sys::Syslog;
|
---|
14 |
|
---|
15 | # don't remove! required for GNU/FHS-ish install from tarball
|
---|
16 | ##uselib##
|
---|
17 |
|
---|
18 | # push "the directory the script is in" into @INC
|
---|
19 | use FindBin;
|
---|
20 | use lib "$FindBin::RealBin/";
|
---|
21 |
|
---|
22 | use MyIPDB;
|
---|
23 | use CustIDCK;
|
---|
24 |
|
---|
25 | openlog "IPDB-search-rpc","pid","$IPDB::syslog_facility";
|
---|
26 |
|
---|
27 | ##fixme: username source? can we leverage some other auth method?
|
---|
28 | # we don't care except for logging here, and Frontier::Client needs
|
---|
29 | # a patch that's not well-distributed to use HTTP AUTH.
|
---|
30 |
|
---|
31 | # Collect the username from HTTP auth. If undefined, we're in
|
---|
32 | # a test environment, or called without a username.
|
---|
33 | my $authuser;
|
---|
34 | if (!defined($ENV{'REMOTE_USER'})) {
|
---|
35 | $authuser = '__temptest';
|
---|
36 | } else {
|
---|
37 | $authuser = $ENV{'REMOTE_USER'};
|
---|
38 | }
|
---|
39 |
|
---|
40 | # Why not a global DB handle? (And a global statement handle, as well...)
|
---|
41 | # Use the connectDB function, otherwise we end up confusing ourselves
|
---|
42 | my $ip_dbh;
|
---|
43 | my $sth;
|
---|
44 | my $errstr;
|
---|
45 | ($ip_dbh,$errstr) = connectDB_My;
|
---|
46 | initIPDBGlobals($ip_dbh);
|
---|
47 |
|
---|
48 | my $methods = {
|
---|
49 | 'ipdb.search' => \&rpc_search,
|
---|
50 | };
|
---|
51 |
|
---|
52 | my $reqcnt = 0;
|
---|
53 |
|
---|
54 | my $req = FCGI::Request();
|
---|
55 |
|
---|
56 | # main FCGI loop.
|
---|
57 | while ($req->Accept() >= 0) {
|
---|
58 | # done here to a) prevent $ENV{'REMOTE_ADDR'} from being empty and b) to collect
|
---|
59 | # the right user for the individual call (since we may be running with FCGI)
|
---|
60 | syslog "debug", "$authuser active, $ENV{'REMOTE_ADDR'}";
|
---|
61 |
|
---|
62 | # don't *think* we need any of these...
|
---|
63 | # %disp_alloctypes, %def_custids, %list_alloctypes
|
---|
64 | # @citylist, @poplist
|
---|
65 | # @masterblocks, %allocated, %free, %bigfree, %routed (removed in /trunk)
|
---|
66 | # %IPDBacl
|
---|
67 | #initIPDBGlobals($ip_dbh);
|
---|
68 |
|
---|
69 | my $res = Frontier::Responder->new(
|
---|
70 | methods => $methods
|
---|
71 | );
|
---|
72 |
|
---|
73 | # "Can't do that" errors
|
---|
74 | if (!$ip_dbh) {
|
---|
75 | print "Content-type: text/xml\n\n".$res->{_decode}->encode_fault(5, $DBI::errstr);
|
---|
76 | } else {
|
---|
77 | print $res->answer;
|
---|
78 | }
|
---|
79 | last if $reqcnt++ > $IPDB::maxfcgi;
|
---|
80 | } # while FCGI::accept
|
---|
81 |
|
---|
82 | exit 0;
|
---|
83 |
|
---|
84 |
|
---|
85 | ##
|
---|
86 | ## Private subs
|
---|
87 | ##
|
---|
88 |
|
---|
89 | # Check RPC ACL
|
---|
90 | sub _aclcheck {
|
---|
91 | my $subsys = shift;
|
---|
92 | return 1 if grep /$ENV{REMOTE_ADDR}/, @{$IPDB::rpcacl{$subsys}};
|
---|
93 | warn "$subsys/$ENV{REMOTE_ADDR} not in ACL\n"; # a bit of logging
|
---|
94 | return 0;
|
---|
95 | }
|
---|
96 |
|
---|
97 | sub _commoncheck {
|
---|
98 | my $argref = shift;
|
---|
99 | my $needslog = shift;
|
---|
100 |
|
---|
101 | die "Missing remote system name\n" if !$argref->{rpcsystem};
|
---|
102 | die "Access denied\n" if !_aclcheck($argref->{rpcsystem});
|
---|
103 | if ($needslog) {
|
---|
104 | die "Missing remote username\n" if !$argref->{rpcuser};
|
---|
105 | }
|
---|
106 | }
|
---|
107 |
|
---|
108 | # stripped-down copy from from main.cgi. should probably be moved to IPDB.pm
|
---|
109 | sub _validateInput {
|
---|
110 | my $argref = shift;
|
---|
111 |
|
---|
112 | if (!$argref->{block}) {
|
---|
113 | $argref->{block} = $argref->{cidr} if $argref->{cidr};
|
---|
114 | die "Block/IP is required\n" if !$argref->{block};
|
---|
115 | }
|
---|
116 |
|
---|
117 | # Alloctype check.
|
---|
118 | chomp $argref->{type};
|
---|
119 |
|
---|
120 | die "Invalid allocation type\n" if (!grep /$argref->{type}/, keys %disp_alloctypes);
|
---|
121 |
|
---|
122 | # Arguably not quite correct, as the custID won't be checked for
|
---|
123 | # validity if there's a default on the type.
|
---|
124 | if ($def_custids{$argref->{type}} eq '') {
|
---|
125 | # Types without a default custID must have one passed in
|
---|
126 | die "Customer ID is required\n" if !$argref->{custid};
|
---|
127 | # Crosscheck with billing.
|
---|
128 | my $status = CustIDCK->custid_exist($argref->{custid});
|
---|
129 | die "Error verifying customer ID: $CustIDCK::ErrMsg\n" if $CustIDCK::Error;
|
---|
130 | die "Customer ID not valid\n" if !$status;
|
---|
131 | } else {
|
---|
132 | # Types that have a default will use it unless one is specified.
|
---|
133 | if ((!$argref->{custid}) || ($argref->{custid} ne 'STAFF')) {
|
---|
134 | $argref->{custid} = $def_custids{$argref->{type}};
|
---|
135 | }
|
---|
136 | }
|
---|
137 | } # end validateInput()
|
---|
138 |
|
---|
139 |
|
---|
140 | ##
|
---|
141 | ## RPC method subs
|
---|
142 | ##
|
---|
143 |
|
---|
144 | sub rpc_search {
|
---|
145 | my %args = @_;
|
---|
146 |
|
---|
147 | _commoncheck(\%args);
|
---|
148 |
|
---|
149 | my @fields;
|
---|
150 | my @vals;
|
---|
151 | my @matchtypes;
|
---|
152 |
|
---|
153 | my %mt = (
|
---|
154 | EXACT => '=',
|
---|
155 | EQUAL => '=',
|
---|
156 | NOT => '!~', # text only?
|
---|
157 | # CIDR options
|
---|
158 | MASK => 'MASK',
|
---|
159 | WITHIN => '<<=',
|
---|
160 | CONTAINS => '>>=',
|
---|
161 | );
|
---|
162 |
|
---|
163 | if ($args{type}) {
|
---|
164 | # assume alloctype class if we only get one letter
|
---|
165 | $args{type} = "_$args{type}" if $args{type} =~ /^.$/;
|
---|
166 | my $notflag = '';
|
---|
167 | if ($args{type} =~ /^NOT:/) {
|
---|
168 | $args{type} =~ s/^NOT://;
|
---|
169 | $notflag = 'NOT ';
|
---|
170 | }
|
---|
171 | if ($args{type} =~ /\./) {
|
---|
172 | $args{type} =~ s/\./_/;
|
---|
173 | push @matchtypes, $notflag.'LIKE';
|
---|
174 | } else {
|
---|
175 | push @matchtypes, ($notflag ? '<>' : '=');
|
---|
176 | }
|
---|
177 | push @fields, 's.type';
|
---|
178 | push @vals, $args{type};
|
---|
179 | }
|
---|
180 |
|
---|
181 | ## CIDR query options.
|
---|
182 | if ($args{cidr}) {
|
---|
183 | $args{cidr} =~ s/^\s*(.+)\s*$/$1/g;
|
---|
184 | # strip matching type substring, if any - only applies to full-CIDR
|
---|
185 | my ($mnote) = $args{cidr} =~ /^(\w+):/;
|
---|
186 | $args{cidr} =~ s/^$mnote:// if $mnote;
|
---|
187 |
|
---|
188 | if ($args{cidr} eq '') { # We has a blank CIDR. Ignore it.
|
---|
189 | } elsif ($args{cidr} =~ /\//) {
|
---|
190 | my ($net,$maskbits) = split /\//, $args{cidr};
|
---|
191 | if ($args{cidr} =~ /^(\d{1,3}\.){3}\d{1,3}\/\d{2}$/) {
|
---|
192 | # Full CIDR match.
|
---|
193 | push @fields, 's.cidr';
|
---|
194 | push @vals, $args{cidr};
|
---|
195 | if ($mnote =~ /(EQUAL|EXACT|CONTAINS|WITHIN)/) {
|
---|
196 | push @matchtypes, $mt{$1};
|
---|
197 | } else { # default to exact match
|
---|
198 | push @matchtypes, '=';
|
---|
199 | }
|
---|
200 | } elsif ($args{cidr} =~ /^(\d{1,3}\.){2}\d{1,3}\/\d{2}$/) {
|
---|
201 | # Partial match; beginning of subnet and maskbits are provided
|
---|
202 | # Show any blocks with the leading octet(s) and that masklength
|
---|
203 | # eg 192.168.179/26 should show all /26 subnets in 192.168.179
|
---|
204 | # Need some more magic for bare /nn searches:
|
---|
205 | push @fields, 's.cidr','masklen(s.cidr)';
|
---|
206 | push @vals, "$net.0/24", $maskbits;
|
---|
207 | push @matchtypes, '<<=','=';
|
---|
208 | }
|
---|
209 | } elsif ($args{cidr} =~ /^(\d{1,3}\.){3}\d{1,3}$/) {
|
---|
210 | # Specific IP address match. Will show the parent chain down to the final allocation.
|
---|
211 | push @fields, 's.cidr';
|
---|
212 | push @vals, $args{cidr};
|
---|
213 | push @matchtypes, '>>=';
|
---|
214 | } elsif ($args{cidr} =~ /^\d{1,3}(\.(\d{1,3}(\.(\d{1,3}\.?)?)?)?)?$/) {
|
---|
215 | # 1, 2, or 3 leading octets in CIDR
|
---|
216 | push @fields, 'text(s.cidr)';
|
---|
217 | push @vals, "$args{cidr}\%";
|
---|
218 | push @matchtypes, 'LIKE'; # hmm
|
---|
219 | } else {
|
---|
220 | # do nothing.
|
---|
221 | ##fixme we'll ignore this to clear out the references to legacy code.
|
---|
222 | } # done with CIDR query options.
|
---|
223 |
|
---|
224 | } # args{cidr}
|
---|
225 |
|
---|
226 | foreach (qw(custid description notes city) ) {
|
---|
227 | if ($args{$_}) {
|
---|
228 | push @fields, "s.$_";
|
---|
229 | if ($args{$_} =~ /^(EXACT|NOT):/) {
|
---|
230 | push @matchtypes, $mt{$1};
|
---|
231 | $args{$_} =~ s/^$1://;
|
---|
232 | } else {
|
---|
233 | push @matchtypes, '~*';
|
---|
234 | }
|
---|
235 | push @vals, $args{$_};
|
---|
236 | }
|
---|
237 | }
|
---|
238 |
|
---|
239 | # Filter on "available", because we can.
|
---|
240 | if ($args{available} && $args{available} =~ /^[yn]$/) {
|
---|
241 | push @fields, "s.available";
|
---|
242 | push @matchtypes, '=';
|
---|
243 | push @vals, $args{available};
|
---|
244 | }
|
---|
245 |
|
---|
246 | my $cols = "s.cidr, s.custid, s.type, s.city, s.description, s.id, s.parent_id, s.available, s.vrf, a.dispname";
|
---|
247 | my $sql = qq(SELECT $cols FROM searchme s JOIN alloctypes a ON s.type = a.type);
|
---|
248 | my @sqlcriteria;
|
---|
249 | for (my $i = 0; $i <= $#fields; $i++) {
|
---|
250 | push @sqlcriteria, "$fields[$i] $matchtypes[$i] ?";
|
---|
251 | }
|
---|
252 | $sql .= " WHERE ".join(' AND ', @sqlcriteria) if @sqlcriteria;
|
---|
253 |
|
---|
254 | # multifield sorting!
|
---|
255 | if ($args{order}) {
|
---|
256 | my @ordfields = split /,/, $args{order};
|
---|
257 | # there are probably better ways to do this
|
---|
258 | my %omap = (cidr => 's.cidr', net => 's.cidr', network => 's.cidr', ip => 's.cidr',
|
---|
259 | custid => 's.custid', type => 's.type', city => 's.city',
|
---|
260 | desc => 's.description', description => 's.description');
|
---|
261 | my @ordlist;
|
---|
262 | # only pass sort field values from the list of acceptable field names or aliases as per %omap
|
---|
263 | foreach my $ord (@ordfields) {
|
---|
264 | push @ordlist, $omap{$ord}
|
---|
265 | if grep /^$ord$/, (keys %omap);
|
---|
266 | }
|
---|
267 | if (@ordlist) {
|
---|
268 | $sql .= " ORDER BY ". join(',', @ordlist);
|
---|
269 | }
|
---|
270 | }
|
---|
271 |
|
---|
272 | my $result = $ip_dbh->selectall_arrayref($sql, {Slice=>{}}, @vals);
|
---|
273 | die $ip_dbh->errstr if !$result;
|
---|
274 |
|
---|
275 | return $result;
|
---|
276 | } # rpc_search()
|
---|
277 |
|
---|
278 |
|
---|
279 | __END__
|
---|
280 |
|
---|
281 | =pod
|
---|
282 |
|
---|
283 | =head1 IPDB XMLRPC Search
|
---|
284 |
|
---|
285 | This is a general-purpose search API for IPDB. It is currently being extended based on requirements from other tools needing to
|
---|
286 | search for data in IPDB.
|
---|
287 |
|
---|
288 | It supports one XMLRPC sub, "search".
|
---|
289 |
|
---|
290 | The calling URL for this API should end with "/search-rpc.cgi". If you are doing many requests, you should use the FastCGI variant
|
---|
291 | with .fcgi instead of .cgi.
|
---|
292 |
|
---|
293 | =head2 Calling conventions
|
---|
294 |
|
---|
295 | IPDB RPC services use "XMLRPC", http://xmlrpc.com, for data exchange.
|
---|
296 |
|
---|
297 | Arguments are passed in as a key-value list, and data is returned as an array of hashes in some form.
|
---|
298 |
|
---|
299 | =over 4
|
---|
300 |
|
---|
301 | =item Perl
|
---|
302 |
|
---|
303 | use Frontier::Client;
|
---|
304 | my $server = Frontier::Client->new(
|
---|
305 | url => "http://server/path/search-rpc.cgi",
|
---|
306 | );
|
---|
307 | my %args = (
|
---|
308 | rpcsystem => 'somesystem',
|
---|
309 | rpcuser => 'someuser',
|
---|
310 | arg1 => 'val1',
|
---|
311 | arg2 => 'val2',
|
---|
312 | );
|
---|
313 | my $result = $server->call('ipdb.search', %args);
|
---|
314 |
|
---|
315 | =item Python 2
|
---|
316 |
|
---|
317 | import xmlrpclib
|
---|
318 | server = xmlrpclib.Server("http://server/path/search-rpc.cgi")
|
---|
319 | result = server.ipdb.search(
|
---|
320 | 'rpcsystem', 'comesystems',
|
---|
321 | 'rpcuser', 'someuser',
|
---|
322 | 'arg1', 'val1',
|
---|
323 | 'arg2', 'val2',
|
---|
324 | )
|
---|
325 |
|
---|
326 | =item Python 3
|
---|
327 |
|
---|
328 | import xmlrpc.client
|
---|
329 | server = xmlrpc.client.ServerProxy("http://server/path/search-rpc.cgi")
|
---|
330 | result = server.ipdb.search(
|
---|
331 | 'rpcsystem', 'somesystem',
|
---|
332 | 'rpcuser', 'someuser',
|
---|
333 | 'arg1', 'val1',
|
---|
334 | 'arg2', 'val2',
|
---|
335 | )
|
---|
336 |
|
---|
337 | =back
|
---|
338 |
|
---|
339 | =head3 Standard arguments
|
---|
340 |
|
---|
341 | The C<rpcsystem> argument is required, and C<rpcuser> is strongly recommended as it may be used for access control in some future
|
---|
342 | updates.
|
---|
343 |
|
---|
344 | C<rpcsystem> must match a configuration entry in the IPDB configuration, and a given string may only be used from an IP listed under
|
---|
345 | that configuration entry.
|
---|
346 |
|
---|
347 | =head2 Search fields and metaoperators
|
---|
348 |
|
---|
349 | Not all fields are exposed for search. For most purposes these should be sufficient.
|
---|
350 |
|
---|
351 | =over 4
|
---|
352 |
|
---|
353 | =item cidr
|
---|
354 |
|
---|
355 | A full or partial CIDR network or IP address. Valid formats include:
|
---|
356 |
|
---|
357 | =over 4
|
---|
358 |
|
---|
359 | =item Complete CIDR network, eg 192.168.2.0/24
|
---|
360 |
|
---|
361 | Returns an exact match for the passed CIDR network.
|
---|
362 |
|
---|
363 | If prefixed with "CONTAINS:", the containing netblocks up to the master block
|
---|
364 | will also be returned.
|
---|
365 |
|
---|
366 | If prefixed with "WITHIN:", any suballocations in that IP range will be returned.
|
---|
367 |
|
---|
368 | =item Partial/short CIDR specification with mask length, eg 192.168.3/27
|
---|
369 |
|
---|
370 | Returns all /27 assignments within 192.168.3.0/24.
|
---|
371 |
|
---|
372 | =item Partial/short CIDR specification, eg 192.168.4
|
---|
373 |
|
---|
374 | Returns all assignments matching that leading partial string. Note that 192.168.4 will also return 192.168.40.0/24 through
|
---|
375 | 192.168.49.0/24 as well as the obvious 192.168.4.0/24.
|
---|
376 |
|
---|
377 | =item Bare IP address with no mask, eg 192.168.5.42
|
---|
378 |
|
---|
379 | Returns all assignments containing that IP.
|
---|
380 |
|
---|
381 | =back
|
---|
382 |
|
---|
383 | =item custid
|
---|
384 |
|
---|
385 | Match on a customer ID. Defaults to a partial match.
|
---|
386 |
|
---|
387 | =item type
|
---|
388 |
|
---|
389 | Match the two-character internal allocation type identifier.
|
---|
390 |
|
---|
391 | Defaults to an exact match. Replace the first character with a dot or underscore, or leave it off, to match all subtypes of a
|
---|
392 | class; eg .i will return all types of static IP assignments.
|
---|
393 |
|
---|
394 | A full list of current allocation types is available from the main RPC API's getTypeList sub.
|
---|
395 |
|
---|
396 | =item city
|
---|
397 |
|
---|
398 | Matches in the city string.
|
---|
399 |
|
---|
400 | =item description
|
---|
401 |
|
---|
402 | Matches in the description string.
|
---|
403 |
|
---|
404 | =item notes
|
---|
405 |
|
---|
406 | Matches in the notes field.
|
---|
407 |
|
---|
408 | =item available
|
---|
409 |
|
---|
410 | Only useful for static IPs. For historic and architectural reasons, unallocated static IPs are included in general search results.
|
---|
411 | Specify 'y' or 'n' to return only unallocated or allocated static IPs respectively.
|
---|
412 |
|
---|
413 | To search for a free block, use the main RPC API's listFree or findAllocateFrom subs.
|
---|
414 |
|
---|
415 | =item order
|
---|
416 |
|
---|
417 | Sort order specification. Send a string of comma-separated field names for subsorting. Valid sort fields are cidr, custid, type,
|
---|
418 | city, and description.
|
---|
419 |
|
---|
420 | =back
|
---|
421 |
|
---|