2016-04-16 16:48:03 +00:00
|
|
|
# Add an iptables rule
|
2016-12-08 13:25:45 +00:00
|
|
|
# This actually runs a command, so you can either define an iptables
|
|
|
|
# command or a script. See the plugins.cfg for the options that are
|
|
|
|
# replaced into the command line.
|
2016-04-16 16:48:03 +00:00
|
|
|
|
2016-04-16 19:31:11 +00:00
|
|
|
import re
|
2016-04-17 09:21:37 +00:00
|
|
|
import socket
|
2016-04-16 19:31:11 +00:00
|
|
|
from io import BytesIO
|
2016-04-16 16:48:03 +00:00
|
|
|
from logging import getLogger, DEBUG, WARN, INFO
|
2016-04-17 09:21:37 +00:00
|
|
|
|
|
|
|
try:
|
2016-04-18 19:33:35 +00:00
|
|
|
from configparser import RawConfigParser
|
2016-04-17 09:21:37 +00:00
|
|
|
except ImportError:
|
|
|
|
from ConfigParser import RawConfigParser
|
|
|
|
|
2016-04-16 16:48:03 +00:00
|
|
|
from portal import logHandler, logFormatter
|
|
|
|
|
2016-04-16 19:31:11 +00:00
|
|
|
# Try to import arping for mac_from_ip()
|
2016-12-08 13:25:45 +00:00
|
|
|
use_arping = True
|
2016-04-16 16:48:03 +00:00
|
|
|
try:
|
|
|
|
from sh import arping
|
|
|
|
except ImportError:
|
2016-12-08 13:25:45 +00:00
|
|
|
use_arping = False
|
2016-04-16 16:48:03 +00:00
|
|
|
pass
|
|
|
|
|
2016-04-16 19:31:11 +00:00
|
|
|
# By default run iptables through sudo, so the worker process must run with
|
|
|
|
# a user that is allowed to execute iptables commands with NOPASSWD.
|
|
|
|
from sh import sudo, ErrorReturnCode
|
2016-04-16 16:48:03 +00:00
|
|
|
|
|
|
|
def run(arg):
|
2016-04-16 19:31:11 +00:00
|
|
|
# Some info from the plugin dispatcher.
|
2016-04-16 16:48:03 +00:00
|
|
|
environ = arg['environ']
|
2016-04-17 09:21:37 +00:00
|
|
|
plugin_config = arg['config']
|
|
|
|
|
|
|
|
config = RawConfigParser(defaults=plugin_config)
|
2016-04-18 16:13:57 +00:00
|
|
|
config.add_section('iptables')
|
|
|
|
config._sections['iptables'] = plugin_config
|
2016-04-16 16:48:03 +00:00
|
|
|
|
2016-04-16 19:31:11 +00:00
|
|
|
# Setup plugin logging
|
|
|
|
l = getLogger('plugin_iptables')
|
2016-04-16 16:48:03 +00:00
|
|
|
l.addHandler(logHandler)
|
2016-04-18 16:13:57 +00:00
|
|
|
if config.getboolean('iptables', 'debug'):
|
2016-04-17 08:21:34 +00:00
|
|
|
l.setLevel(DEBUG)
|
2016-04-18 16:13:57 +00:00
|
|
|
l.debug('debug logging enabled')
|
2016-04-16 16:48:03 +00:00
|
|
|
|
2016-12-08 13:25:45 +00:00
|
|
|
# Get client IP from webapp
|
2016-04-16 22:22:13 +00:00
|
|
|
client_ip = environ.get(
|
|
|
|
'HTTP_X_FORWARDED_FOR',
|
|
|
|
environ.get('REMOTE_ADDR')
|
|
|
|
)
|
2016-04-16 19:31:11 +00:00
|
|
|
client_mac = None
|
|
|
|
error_msg = None
|
|
|
|
iptables_failed = False
|
|
|
|
|
2016-12-08 13:25:45 +00:00
|
|
|
# Verify client IP
|
2016-04-17 09:21:37 +00:00
|
|
|
try:
|
|
|
|
socket.inet_aton(client_ip)
|
|
|
|
except socket.error:
|
|
|
|
l.error('Client IP-address is invalid')
|
|
|
|
return {
|
|
|
|
'error': str(e),
|
|
|
|
'failed': True
|
|
|
|
}
|
|
|
|
|
2016-12-08 13:25:45 +00:00
|
|
|
# Attempt to get client HW address with arping
|
|
|
|
if use_arping:
|
|
|
|
try:
|
|
|
|
client_mac = mac_from_ip(
|
|
|
|
l,
|
|
|
|
config.get('iptables', 'arping'),
|
|
|
|
client_ip
|
|
|
|
)
|
|
|
|
except Exception as e:
|
|
|
|
l.warn('Failed to get client HW address: {error}'.format(
|
|
|
|
error=str(e)
|
|
|
|
))
|
|
|
|
error_msg = str(e)
|
|
|
|
pass
|
2016-04-16 19:31:11 +00:00
|
|
|
|
|
|
|
if client_ip:
|
2016-12-08 13:57:30 +00:00
|
|
|
iptables_cmd = config.get('iptables', 'iptables_cmd').format(
|
|
|
|
ip_address=client_ip,
|
|
|
|
mac_address=client_mac
|
2016-04-16 19:31:11 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
output = BytesIO()
|
|
|
|
error = BytesIO()
|
|
|
|
try:
|
2016-12-08 13:57:30 +00:00
|
|
|
# The two arguments must not contain spaces of course.
|
|
|
|
rc = sudo(tuple(iptables_cmd.split(' ')), _out=output, _err=error)
|
2016-04-16 19:31:11 +00:00
|
|
|
except ErrorReturnCode:
|
|
|
|
error.seek(0)
|
|
|
|
error_msg = error.read()
|
|
|
|
l.warn('{cmd}: exited badly: {error}'.format(
|
2016-12-08 13:57:30 +00:00
|
|
|
cmd=('iptables', iptables_cmd),
|
2016-04-16 19:31:11 +00:00
|
|
|
error=error_msg
|
|
|
|
))
|
|
|
|
iptables_failed = True
|
|
|
|
pass
|
|
|
|
except Exception as e:
|
|
|
|
l.warn('{cmd}: failed: {error}'.format(
|
2016-12-08 13:57:30 +00:00
|
|
|
cmd=('iptables', iptables_cmd),
|
2016-04-16 19:31:11 +00:00
|
|
|
error=str(e)
|
|
|
|
))
|
|
|
|
error_msg = str(e)
|
|
|
|
iptables_failed = True
|
|
|
|
pass
|
|
|
|
|
2016-12-08 15:15:14 +00:00
|
|
|
if rc.exit_code == 0:
|
|
|
|
l.debug('Created iptables IP rule successfully')
|
|
|
|
|
2016-04-16 19:31:11 +00:00
|
|
|
# If all else fails, error! This will be shown to end users.
|
|
|
|
return {
|
|
|
|
'error': error_msg,
|
|
|
|
'failed': iptables_failed
|
|
|
|
}
|
2016-04-16 16:48:03 +00:00
|
|
|
|
|
|
|
|
|
|
|
# Try to get the mac address from the IP. Requires arping installed.
|
2016-04-16 19:31:11 +00:00
|
|
|
def mac_from_ip(l, arping_args, ip):
|
|
|
|
# Add IP to args
|
|
|
|
arping_args = arping_args.format(
|
|
|
|
ip_address=ip
|
|
|
|
)
|
|
|
|
|
|
|
|
# Make args into tuple
|
|
|
|
arping_args = tuple(arping_args.split(' '))
|
|
|
|
|
|
|
|
# Save output as buffer object
|
|
|
|
output = BytesIO()
|
|
|
|
|
|
|
|
# Run arping
|
|
|
|
arping(arping_args, _out=output)
|
|
|
|
output.seek(0)
|
|
|
|
|
|
|
|
# Parse HW address from output
|
|
|
|
for line in output:
|
|
|
|
line_start = 'Unicast reply from {ip} '.format(
|
|
|
|
ip=ip
|
|
|
|
)
|
|
|
|
if line.startswith(line_start):
|
|
|
|
m = re.search('(([0-9A-Fa-f]{2}[:]){5}([0-9A-Fa-f]{2}))', line)
|
|
|
|
if m: return m.group(0)
|
2016-12-08 13:57:30 +00:00
|
|
|
|