
The current parsing was broken because of a change in the date format. Actually, the new method is much simpler, and should resist small syntax changes in Bird's output. We don't use an ugly regexp anymore. Important limitation: parsing will be messed up if the date contains a space character. This does not happen with the default date format of both bird 1.3 and bird 1.4, but since the date format is configurable in bird, it may happen anyway.
628 lines
20 KiB
Python
628 lines
20 KiB
Python
#!/usr/bin/python
|
|
# -*- coding: utf-8 -*-
|
|
# vim: ts=4
|
|
###
|
|
#
|
|
# Copyright (c) 2012 Mehdi Abaakouk
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License version 3 as
|
|
# published by the Free Software Foundation
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
#
|
|
###
|
|
|
|
import subprocess
|
|
import logging
|
|
from logging.handlers import TimedRotatingFileHandler
|
|
import re
|
|
from urllib2 import urlopen
|
|
from urllib import quote, unquote
|
|
import json
|
|
import random
|
|
|
|
from toolbox import mask_is_valid, ipv6_is_valid, ipv4_is_valid, resolve, save_cache_pickle, load_cache_pickle, unescape
|
|
#from xml.sax.saxutils import escape
|
|
|
|
|
|
import pydot
|
|
from flask import Flask, render_template, jsonify, redirect, session, request, abort, Response, Markup
|
|
|
|
app = Flask(__name__)
|
|
app.config.from_pyfile('lg.cfg')
|
|
app.secret_key = app.config["SESSION_KEY"]
|
|
app.debug = app.config["DEBUG"]
|
|
|
|
file_handler = TimedRotatingFileHandler(filename=app.config["LOG_FILE"], when="midnight")
|
|
file_handler.setLevel(getattr(logging, app.config["LOG_LEVEL"].upper()))
|
|
app.logger.addHandler(file_handler)
|
|
|
|
|
|
def get_asn_from_as(n):
|
|
asn_zone = app.config.get("ASN_ZONE", "asn.cymru.com")
|
|
try:
|
|
data = resolve("AS%s.%s" % (n, asn_zone) ,"TXT").replace("'","").replace('"','')
|
|
except:
|
|
return " "*5
|
|
return [ field.strip() for field in data.split("|") ]
|
|
|
|
|
|
def add_links(text):
|
|
"""Browser a string and replace ipv4, ipv6, as number, with a
|
|
whois link """
|
|
|
|
if type(text) in [str, unicode]:
|
|
text = text.split("\n")
|
|
|
|
ret_text = []
|
|
for line in text:
|
|
# Some heuristic to create link
|
|
if line.strip().startswith("BGP.as_path:") or \
|
|
line.strip().startswith("Neighbor AS:"):
|
|
ret_text.append(re.sub(r'(\d+)', r'<a href="/whois?q=\1" class="whois">\1</a>', line))
|
|
else:
|
|
line = re.sub(r'([a-zA-Z0-9\-]*\.([a-zA-Z]{2,3}){1,2})(\s|$)', r'<a href="/whois?q=\1" class="whois">\1</a>\3', line)
|
|
line = re.sub(r'AS(\d+)', r'<a href="/whois?q=\1" class="whois">AS\1</a>', line)
|
|
line = re.sub(r'(\d+\.\d+\.\d+\.\d+)', r'<a href="/whois?q=\1" class="whois">\1</a>', line)
|
|
if len(request.path) >= 2:
|
|
hosts = "/".join(request.path.split("/")[2:])
|
|
else:
|
|
hosts = "/"
|
|
line = re.sub(r'\[(\w+)\s+((|\d\d\d\d-\d\d-\d\d\s)(|\d\d:)\d\d:\d\d|\w\w\w\d\d)', r'[<a href="/detail/%s?q=\1">\1</a> \2' % hosts, line)
|
|
line = re.sub(r'(^|\s+)(([a-f\d]{0,4}:){3,10}[a-f\d]{0,4})', r'\1<a href="/whois?q=\2" class="whois">\2</a>', line, re.I)
|
|
ret_text.append(line)
|
|
return "\n".join(ret_text)
|
|
|
|
|
|
def set_session(request_type, hosts, proto, request_args):
|
|
""" Store all data from user in the user session """
|
|
session.permanent = True
|
|
session.update({
|
|
"request_type": request_type,
|
|
"hosts": hosts,
|
|
"proto": proto,
|
|
"request_args": request_args,
|
|
})
|
|
history = session.get("history", [])
|
|
|
|
# erase old format history
|
|
if type(history) != type(list()):
|
|
history = []
|
|
|
|
t = (hosts, proto, request_type, request_args)
|
|
if t in history:
|
|
del history[history.index(t)]
|
|
history.insert(0, t)
|
|
session["history"] = history[:20]
|
|
|
|
|
|
def whois_command(query):
|
|
server = []
|
|
if app.config.get("WHOIS_SERVER", ""):
|
|
server = [ "-h", app.config.get("WHOIS_SERVER") ]
|
|
return subprocess.Popen(['whois'] + server + [query], stdout=subprocess.PIPE).communicate()[0].decode('utf-8', 'ignore')
|
|
|
|
|
|
def bird_command(host, proto, query):
|
|
"""Alias to bird_proxy for bird service"""
|
|
return bird_proxy(host, proto, "bird", query)
|
|
|
|
|
|
def bird_proxy(host, proto, service, query):
|
|
"""Retreive data of a service from a running lg-proxy on a remote node
|
|
|
|
First and second arguments are the node and the port of the running lg-proxy
|
|
Third argument is the service, can be "traceroute" or "bird"
|
|
Last argument, the query to pass to the service
|
|
|
|
return tuple with the success of the command and the returned data
|
|
"""
|
|
|
|
path = ""
|
|
if proto == "ipv6":
|
|
path = service + "6"
|
|
elif proto == "ipv4":
|
|
path = service
|
|
|
|
port = app.config["PROXY"].get(host, "")
|
|
|
|
if not port:
|
|
return False, 'Host "%s" invalid' % host
|
|
elif not path:
|
|
return False, 'Proto "%s" invalid' % proto
|
|
else:
|
|
url = "http://%s.%s:%d/%s?q=%s" % (host, app.config["DOMAIN"], port, path, quote(query))
|
|
try:
|
|
f = urlopen(url)
|
|
resultat = f.read()
|
|
status = True # retreive remote status
|
|
except IOError:
|
|
resultat = "Failed retreive url: %s" % url
|
|
status = False
|
|
return status, resultat
|
|
|
|
|
|
@app.context_processor
|
|
def inject_commands():
|
|
commands = [
|
|
("traceroute", "traceroute ..."),
|
|
("summary", "show protocols"),
|
|
("detail", "show protocols ... all"),
|
|
("prefix", "show route for ..."),
|
|
("prefix_detail", "show route for ... all"),
|
|
("prefix_bgpmap", "show route for ... (bgpmap)"),
|
|
("where", "show route where net ~ [ ... ]"),
|
|
("where_detail", "show route where net ~ [ ... ] all"),
|
|
("where_bgpmap", "show route where net ~ [ ... ] (bgpmap)"),
|
|
("adv", "show route ..."),
|
|
("adv_bgpmap", "show route ... (bgpmap)"),
|
|
]
|
|
commands_dict = {}
|
|
for id, text in commands:
|
|
commands_dict[id] = text
|
|
return dict(commands=commands, commands_dict=commands_dict)
|
|
|
|
|
|
@app.context_processor
|
|
def inject_all_host():
|
|
return dict(all_hosts="+".join(app.config["PROXY"].keys()))
|
|
|
|
|
|
@app.route("/")
|
|
def hello():
|
|
return redirect("/summary/%s/ipv4" % "+".join(app.config["PROXY"].keys()))
|
|
|
|
|
|
def error_page(text):
|
|
return render_template('error.html', errors=[text]), 500
|
|
|
|
|
|
@app.errorhandler(400)
|
|
def incorrect_request(e):
|
|
return render_template('error.html', warnings=["The server could not understand the request"]), 400
|
|
|
|
|
|
@app.errorhandler(404)
|
|
def page_not_found(e):
|
|
return render_template('error.html', warnings=["The requested URL was not found on the server."]), 404
|
|
|
|
def get_query():
|
|
q = unquote(request.args.get('q', '').strip())
|
|
return q
|
|
|
|
@app.route("/whois")
|
|
def whois():
|
|
query = get_query()
|
|
if not query:
|
|
abort(400)
|
|
|
|
try:
|
|
asnum = int(query)
|
|
query = "as%d" % asnum
|
|
except:
|
|
m = re.match(r"[\w\d-]*\.(?P<domain>[\d\w-]+\.[\d\w-]+)$", query)
|
|
if m:
|
|
query = query.groupdict()["domain"]
|
|
|
|
output = whois_command(query).replace("\n", "<br>")
|
|
return jsonify(output=output, title=query)
|
|
|
|
|
|
SUMMARY_UNWANTED_PROTOS = ["Kernel", "Static", "Device"]
|
|
|
|
@app.route("/summary/<hosts>")
|
|
@app.route("/summary/<hosts>/<proto>")
|
|
def summary(hosts, proto="ipv4"):
|
|
|
|
set_session("summary", hosts, proto, "")
|
|
command = "show protocols"
|
|
|
|
summary = {}
|
|
errors = []
|
|
for host in hosts.split("+"):
|
|
ret, res = bird_command(host, proto, command)
|
|
res = res.split("\n")
|
|
|
|
if ret is False:
|
|
errors.append("%s" % res)
|
|
continue
|
|
|
|
if len(res) <= 1:
|
|
errors.append("%s: bird command failed with error, %s" % (host, "\n".join(res)))
|
|
continue
|
|
|
|
data = []
|
|
for line in res[1:]:
|
|
line = line.strip()
|
|
if line and (line.split() + [""])[1] not in SUMMARY_UNWANTED_PROTOS:
|
|
split = line.split()
|
|
if len(split) >= 5:
|
|
props = dict()
|
|
props["name"] = split[0]
|
|
props["proto"] = split[1]
|
|
props["table"] = split[2]
|
|
props["state"] = split[3]
|
|
props["since"] = split[4]
|
|
props["info"] = ' '.join(split[5:]) if len(split) > 5 else ""
|
|
data.append(props)
|
|
else:
|
|
app.logger.warning("couldn't parse: %s", line)
|
|
|
|
summary[host] = data
|
|
|
|
return render_template('summary.html', summary=summary, command=command, errors=errors)
|
|
|
|
|
|
@app.route("/detail/<hosts>/<proto>")
|
|
def detail(hosts, proto):
|
|
name = get_query()
|
|
|
|
if not name:
|
|
abort(400)
|
|
|
|
set_session("detail", hosts, proto, name)
|
|
command = "show protocols all %s" % name
|
|
|
|
detail = {}
|
|
errors = []
|
|
for host in hosts.split("+"):
|
|
ret, res = bird_command(host, proto, command)
|
|
res = res.split("\n")
|
|
|
|
if ret is False:
|
|
errors.append("%s" % res)
|
|
continue
|
|
|
|
if len(res) <= 1:
|
|
errors.append("%s: bird command failed with error, %s" % (host, "\n".join(res)))
|
|
continue
|
|
|
|
detail[host] = {"status": res[1], "description": add_links(res[2:])}
|
|
|
|
return render_template('detail.html', detail=detail, command=command, errors=errors)
|
|
|
|
|
|
@app.route("/traceroute/<hosts>/<proto>")
|
|
def traceroute(hosts, proto):
|
|
q = get_query()
|
|
|
|
if not q:
|
|
abort(400)
|
|
|
|
set_session("traceroute", hosts, proto, q)
|
|
|
|
if proto == "ipv6" and not ipv6_is_valid(q):
|
|
try:
|
|
q = resolve(q, "AAAA")
|
|
except:
|
|
return error_page("%s is unresolvable or invalid for %s" % (q, proto))
|
|
if proto == "ipv4" and not ipv4_is_valid(q):
|
|
try:
|
|
q = resolve(q, "A")
|
|
except:
|
|
return error_page("%s is unresolvable or invalid for %s" % (q, proto))
|
|
|
|
errors = []
|
|
infos = {}
|
|
for host in hosts.split("+"):
|
|
status, resultat = bird_proxy(host, proto, "traceroute", q)
|
|
if status is False:
|
|
errors.append("%s" % resultat)
|
|
continue
|
|
|
|
|
|
infos[host] = add_links(resultat)
|
|
return render_template('traceroute.html', infos=infos, errors=errors)
|
|
|
|
|
|
@app.route("/adv/<hosts>/<proto>")
|
|
def show_route_filter(hosts, proto):
|
|
return show_route("adv", hosts, proto)
|
|
|
|
|
|
@app.route("/adv_bgpmap/<hosts>/<proto>")
|
|
def show_route_filter_bgpmap(hosts, proto):
|
|
return show_route("adv_bgpmap", hosts, proto)
|
|
|
|
|
|
@app.route("/where/<hosts>/<proto>")
|
|
def show_route_where(hosts, proto):
|
|
return show_route("where", hosts, proto)
|
|
|
|
|
|
@app.route("/where_detail/<hosts>/<proto>")
|
|
def show_route_where_detail(hosts, proto):
|
|
return show_route("where_detail", hosts, proto)
|
|
|
|
|
|
@app.route("/where_bgpmap/<hosts>/<proto>")
|
|
def show_route_where_bgpmap(hosts, proto):
|
|
return show_route("where_bgpmap", hosts, proto)
|
|
|
|
|
|
@app.route("/prefix/<hosts>/<proto>")
|
|
def show_route_for(hosts, proto):
|
|
return show_route("prefix", hosts, proto)
|
|
|
|
|
|
@app.route("/prefix_detail/<hosts>/<proto>")
|
|
def show_route_for_detail(hosts, proto):
|
|
return show_route("prefix_detail", hosts, proto)
|
|
|
|
|
|
@app.route("/prefix_bgpmap/<hosts>/<proto>")
|
|
def show_route_for_bgpmap(hosts, proto):
|
|
return show_route("prefix_bgpmap", hosts, proto)
|
|
|
|
|
|
def get_as_name(_as):
|
|
"""return a string that contain the as number following by the as name
|
|
|
|
It's the use whois database informations
|
|
# Warning, the server can be blacklisted from ripe is too many requests are done
|
|
"""
|
|
if not _as:
|
|
return "AS?????"
|
|
|
|
if not _as.isdigit():
|
|
return _as.strip()
|
|
|
|
name = get_asn_from_as(_as)[-1].replace(" ","\r",1)
|
|
return "AS%s | %s" % (_as, name)
|
|
|
|
|
|
def get_as_number_from_protocol_name(host, proto, protocol):
|
|
ret, res = bird_command(host, proto, "show protocols all %s" % protocol)
|
|
re_asnumber = re.search("Neighbor AS:\s*(\d*)", res)
|
|
if re_asnumber:
|
|
return re_asnumber.group(1)
|
|
else:
|
|
return "?????"
|
|
|
|
|
|
@app.route("/bgpmap/")
|
|
def show_bgpmap():
|
|
"""return a bgp map in a png file, from the json tree in q argument"""
|
|
|
|
data = get_query()
|
|
if not data:
|
|
abort(400)
|
|
|
|
data = json.loads(data)
|
|
|
|
graph = pydot.Dot('BGPMAP', graph_type='digraph')
|
|
|
|
nodes = {}
|
|
edges = {}
|
|
|
|
def escape(label):
|
|
label = label.replace("&", "&")
|
|
label = label.replace(">", ">")
|
|
label = label.replace("<", "<")
|
|
return label
|
|
|
|
def add_node(_as, **kwargs):
|
|
if _as not in nodes:
|
|
kwargs["label"] = '<<TABLE CELLBORDER="0" BORDER="0" CELLPADDING="0" CELLSPACING="0"><TR><TD ALIGN="CENTER">' + escape(kwargs.get("label", get_as_name(_as))).replace("\r","<BR/>") + "</TD></TR></TABLE>>"
|
|
nodes[_as] = pydot.Node(_as, style="filled", fontsize="10", **kwargs)
|
|
graph.add_node(nodes[_as])
|
|
return nodes[_as]
|
|
|
|
def add_edge(_previous_as, _as, **kwargs):
|
|
kwargs["splines"] = "true"
|
|
force = kwargs.get("force", False)
|
|
|
|
edge_tuple = (_previous_as, _as)
|
|
if force or edge_tuple not in edges:
|
|
edge = pydot.Edge(*edge_tuple, **kwargs)
|
|
graph.add_edge(edge)
|
|
edges[edge_tuple] = edge
|
|
elif "label" in kwargs and kwargs["label"]:
|
|
e = edges[edge_tuple]
|
|
|
|
label_without_star = kwargs["label"].replace("*", "")
|
|
labels = e.get_label().split("\r")
|
|
if "%s*" % label_without_star not in labels:
|
|
labels = [ kwargs["label"] ] + [ l for l in labels if not l.startswith(label_without_star) ]
|
|
labels = sorted(labels, cmp=lambda x,y: x.endswith("*") and -1 or 1)
|
|
|
|
label = escape("\r".join(labels))
|
|
e.set_label(label)
|
|
return edges[edge_tuple]
|
|
|
|
for host, asmaps in data.iteritems():
|
|
add_node(host, label= "%s\r%s" % (host.upper(), app.config["DOMAIN"].upper()), shape="box", fillcolor="#F5A9A9")
|
|
|
|
as_number = app.config["AS_NUMBER"].get(host, None)
|
|
if as_number:
|
|
node = add_node(as_number, fillcolor="#F5A9A9")
|
|
edge = add_edge(as_number, nodes[host])
|
|
edge.set_color("red")
|
|
edge.set_style("bold")
|
|
|
|
#colors = [ "#009e23", "#1a6ec1" , "#d05701", "#6f879f", "#939a0e", "#0e9a93", "#9a0e85", "#56d8e1" ]
|
|
previous_as = None
|
|
hosts = data.keys()
|
|
for host, asmaps in data.iteritems():
|
|
first = True
|
|
for asmap in asmaps:
|
|
previous_as = host
|
|
color = "#%x" % random.randint(0, 16777215)
|
|
|
|
hop = False
|
|
hop_label = ""
|
|
for _as in asmap:
|
|
if _as == previous_as:
|
|
continue
|
|
|
|
if not hop:
|
|
hop = True
|
|
if _as not in hosts:
|
|
hop_label = _as
|
|
if first:
|
|
hop_label = hop_label + "*"
|
|
continue
|
|
else:
|
|
hop_label = ""
|
|
|
|
|
|
add_node(_as, fillcolor=(first and "#F5A9A9" or "white"))
|
|
if hop_label:
|
|
edge = add_edge(nodes[previous_as], nodes[_as], label=hop_label, fontsize="7")
|
|
else:
|
|
edge = add_edge(nodes[previous_as], nodes[_as], fontsize="7")
|
|
|
|
hop_label = ""
|
|
|
|
if first:
|
|
edge.set_style("bold")
|
|
edge.set_color("red")
|
|
elif edge.get_color() != "red":
|
|
edge.set_style("dashed")
|
|
edge.set_color(color)
|
|
|
|
previous_as = _as
|
|
first = False
|
|
|
|
if previous_as:
|
|
node = add_node(previous_as)
|
|
node.set_shape("box")
|
|
|
|
#return Response("<pre>" + graph.create_dot() + "</pre>")
|
|
return Response(graph.create_png(), mimetype='image/png')
|
|
|
|
|
|
def build_as_tree_from_raw_bird_ouput(host, proto, text):
|
|
"""Extract the as path from the raw bird "show route all" command"""
|
|
|
|
path = None
|
|
paths = []
|
|
net_dest = None
|
|
for line in text:
|
|
line = line.strip()
|
|
|
|
expr = re.search(r'(.*)via\s+([0-9a-fA-F:\.]+)\s+on.*\[(\w+)\s+', line)
|
|
if expr:
|
|
if path:
|
|
path.append(net_dest)
|
|
paths.append(path)
|
|
path = None
|
|
|
|
if expr.group(1).strip():
|
|
net_dest = expr.group(1).strip()
|
|
|
|
peer_ip = expr.group(2).strip()
|
|
peer_protocol_name = expr.group(3).strip()
|
|
# Check if via line is a internal route
|
|
for rt_host, rt_ips in app.config["ROUTER_IP"].iteritems():
|
|
# Special case for internal routing
|
|
if peer_ip in rt_ips:
|
|
path = [rt_host]
|
|
break
|
|
else:
|
|
# ugly hack for good printing
|
|
path = [ peer_protocol_name ]
|
|
# path = ["%s\r%s" % (peer_protocol_name, get_as_name(get_as_number_from_protocol_name(host, proto, peer_protocol_name)))]
|
|
|
|
expr2 = re.search(r'(.*)unreachable\s+\[(\w+)\s+', line)
|
|
if expr2:
|
|
if path:
|
|
path.append(net_dest)
|
|
paths.append(path)
|
|
path = None
|
|
|
|
if expr2.group(1).strip():
|
|
net_dest = expr2.group(1).strip()
|
|
|
|
if line.startswith("BGP.as_path:"):
|
|
path.extend(line.replace("BGP.as_path:", "").strip().split(" "))
|
|
|
|
if path:
|
|
path.append(net_dest)
|
|
paths.append(path)
|
|
|
|
return paths
|
|
|
|
|
|
def show_route(request_type, hosts, proto):
|
|
expression = get_query()
|
|
if not expression:
|
|
abort(400)
|
|
|
|
set_session(request_type, hosts, proto, expression)
|
|
|
|
bgpmap = request_type.endswith("bgpmap")
|
|
|
|
all = (request_type.endswith("detail") and " all" or "")
|
|
if bgpmap:
|
|
all = " all"
|
|
|
|
if request_type.startswith("adv"):
|
|
command = "show route " + expression.strip()
|
|
if bgpmap and not command.endswith("all"):
|
|
command = command + " all"
|
|
elif request_type.startswith("where"):
|
|
command = "show route where net ~ [ " + expression + " ]" + all
|
|
else:
|
|
mask = ""
|
|
if len(expression.split("/")) == 2:
|
|
expression, mask = (expression.split("/"))
|
|
|
|
if not mask and proto == "ipv4":
|
|
mask = "32"
|
|
if not mask and proto == "ipv6":
|
|
mask = "128"
|
|
if not mask_is_valid(mask):
|
|
return error_page("mask %s is invalid" % mask)
|
|
|
|
if proto == "ipv6" and not ipv6_is_valid(expression):
|
|
try:
|
|
expression = resolve(expression, "AAAA")
|
|
except:
|
|
return error_page("%s is unresolvable or invalid for %s" % (expression, proto))
|
|
if proto == "ipv4" and not ipv4_is_valid(expression):
|
|
try:
|
|
expression = resolve(expression, "A")
|
|
except:
|
|
return error_page("%s is unresolvable or invalid for %s" % (expression, proto))
|
|
|
|
if mask:
|
|
expression += "/" + mask
|
|
|
|
command = "show route for " + expression + all
|
|
|
|
detail = {}
|
|
errors = []
|
|
for host in hosts.split("+"):
|
|
ret, res = bird_command(host, proto, command)
|
|
res = res.split("\n")
|
|
|
|
if ret is False:
|
|
errors.append("%s" % res)
|
|
continue
|
|
|
|
if len(res) <= 1:
|
|
errors.append("%s: bird command failed with error, %s" % (host, "\n".join(res)))
|
|
continue
|
|
|
|
if bgpmap:
|
|
detail[host] = build_as_tree_from_raw_bird_ouput(host, proto, res)
|
|
else:
|
|
detail[host] = add_links(res)
|
|
|
|
if bgpmap:
|
|
detail = json.dumps(detail)
|
|
|
|
return render_template((bgpmap and 'bgpmap.html' or 'route.html'), detail=detail, command=command, expression=expression, errors=errors)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
app.run(app.config.get("BIND_IP", "0.0.0.0"), app.config.get("BIND_PORT", 5000))
|