common.pm 71 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022
  1. package eyelib::common;
  2. #
  3. # Copyright (C) Roman Dmitriev, rnd@rajven.ru
  4. #
  5. use utf8;
  6. use open ":encoding(utf8)";
  7. use strict;
  8. use English;
  9. use FindBin '$Bin';
  10. use lib "/opt/Eye/scripts";
  11. use base 'Exporter';
  12. use vars qw(@EXPORT @ISA);
  13. use eyelib::config;
  14. use eyelib::main;
  15. use Net::Patricia;
  16. use eyelib::net_utils;
  17. use Data::Dumper;
  18. use eyelib::database;
  19. use DateTime;
  20. use POSIX qw(mktime ctime strftime);
  21. use File::Temp qw(tempfile);
  22. use DBI;
  23. our @ISA = qw(Exporter);
  24. our @EXPORT = qw(
  25. apply_device_lock
  26. create_dns_cname
  27. create_dns_hostname
  28. create_dns_ptr
  29. delete_device
  30. delete_dns_cname
  31. delete_dns_hostname
  32. delete_dns_ptr
  33. delete_user
  34. delete_user_auth
  35. find_mac_in_subnet
  36. get_default_ou
  37. get_device_by_ip
  38. get_dns_name
  39. get_dynamic_ou
  40. get_first_line
  41. get_ip_subnet
  42. get_new_user_id
  43. get_notify_subnet
  44. GetNowTime
  45. get_office_subnet
  46. get_subnets_ref
  47. GetTimeStrByUnixTime
  48. GetUnixTimeByStr
  49. is_ad_computer
  50. is_default_ou
  51. is_dynamic_ou
  52. is_hotspot
  53. new_auth
  54. new_user
  55. process_dhcp_request
  56. recalc_quotes
  57. record_to_txt
  58. resurrection_auth
  59. set_changed
  60. set_lock_discovery
  61. unbind_ports
  62. unblock_user
  63. unset_lock_discovery
  64. update_dns_record
  65. update_dns_record_by_dhcp
  66. get_creation_method
  67. );
  68. BEGIN
  69. {
  70. #---------------------------------------------------------------------------------------------------------------
  71. sub get_first_line {
  72. my $msg = shift;
  73. if (!$msg) { return; }
  74. if ($msg=~ /(.*)(\n|\<br\>)/) {
  75. $msg = $1 if ($1);
  76. chomp($msg);
  77. }
  78. return $msg;
  79. }
  80. #---------------------------------------------------------------------------------------------------------------
  81. sub unbind_ports {
  82. my ($db, $device_id) = @_;
  83. return unless $db && defined $device_id && $device_id =~ /^\d+$/; # защита от нечисловых ID
  84. # Получаем все порты устройства
  85. my @target = get_records_sql($db,
  86. "SELECT target_port_id, id FROM device_ports WHERE device_id = ?",
  87. $device_id
  88. );
  89. foreach my $row (@target) {
  90. # Обнуляем ссылки НА этот порт (кто ссылается на него)
  91. do_sql($db, "UPDATE device_ports SET target_port_id = 0 WHERE target_port_id = ?", $row->{id});
  92. # Обнуляем ссылку С этого порта (куда он ссылался)
  93. do_sql($db, "UPDATE device_ports SET target_port_id = 0 WHERE id = ?", $row->{id});
  94. }
  95. }
  96. #---------------------------------------------------------------------------------------------------------------
  97. sub get_dns_name {
  98. my ($db, $id) = @_;
  99. return unless $db && defined $id;
  100. # Защита: убедимся, что $id — положительное целое число
  101. return unless $id =~ /^\d+$/ && $id > 0;
  102. my $auth_record = get_record_sql(
  103. $db,
  104. "SELECT dns_name FROM user_auth WHERE deleted = 0 AND id = ?",
  105. $id
  106. );
  107. return $auth_record && $auth_record->{dns_name}
  108. ? $auth_record->{dns_name}
  109. : undef;
  110. }
  111. #---------------------------------------------------------------------------------------------------------------
  112. sub record_to_txt {
  113. my ($db, $table, $id) = @_;
  114. return unless $db && defined $table && defined $id;
  115. # Валидация имени таблицы: только буквы, цифры, подчёркивания
  116. return unless $table =~ /^[a-zA-Z_][a-zA-Z0-9_]*$/;
  117. # Валидация ID: должно быть положительное целое число
  118. return unless $id =~ /^\d+$/ && $id > 0;
  119. my $record = get_record_sql(
  120. $db,
  121. "SELECT * FROM $table WHERE id = ?",
  122. $id
  123. );
  124. return hash_to_text($record);
  125. }
  126. #---------------------------------------------------------------------------------------------------------------
  127. sub delete_user_auth {
  128. my ($db, $id) = @_;
  129. return 0 unless $db && defined $id;
  130. # Валидация ID
  131. return 0 unless $id =~ /^\d+$/ && $id > 0;
  132. # Получаем основную запись
  133. my $record = get_record_sql($db, "SELECT * FROM user_auth WHERE id = ?", $id);
  134. return 0 unless $record; # если записи нет — выходим
  135. # Формируем идентификатор для лога
  136. my $auth_ident = $record->{ip} // '';
  137. if ($record->{dns_name}) {
  138. $auth_ident .= '[' . $record->{dns_name} . ']';
  139. }
  140. if ($record->{description}) {
  141. $auth_ident .= ' :: ' . $record->{description};
  142. }
  143. my $txt_record = hash_to_text($record) // '';
  144. my $msg = "";
  145. # --- Удаляем алиасы ---
  146. my @aliases = get_records_sql($db, "SELECT * FROM user_auth_alias WHERE auth_id = ?", $id);
  147. foreach my $alias (@aliases) {
  148. my $alias_id = $alias->{id};
  149. next unless defined $alias_id && $alias_id =~ /^\d+$/;
  150. # Правильный вызов: таблица + ID (число)
  151. my $alias_txt = record_to_txt($db, 'user_auth_alias', $alias_id) // '';
  152. if (delete_record($db, 'user_auth_alias', 'id = ?', $alias_id)) {
  153. $msg = "Deleting an alias: $alias_txt\n::Success!\n" . $msg;
  154. } else {
  155. $msg = "Deleting an alias: $alias_txt\n::Fail!\n" . $msg;
  156. }
  157. }
  158. # --- Удаляем соединения ---
  159. do_sql($db, "DELETE FROM connections WHERE auth_id = ?", $id);
  160. # --- Удаляем основную запись ---
  161. my $changes = delete_record($db, "user_auth", "id = ?", $id);
  162. if ($changes) {
  163. $msg = "Deleting ip-record: $txt_record\n::Success!\n" . $msg;
  164. } else {
  165. $msg = "Deleting ip-record: $txt_record\n::Fail!\n" . $msg;
  166. }
  167. $msg = "Deleting user ip record $auth_ident\n\n" . $msg;
  168. db_log_warning($db, $msg, $id);
  169. # Отправка уведомления
  170. my $send_alert = isNotifyDelete(get_notify_subnet($db, $record->{ip}));
  171. sendEmail("WARN! " . get_first_line($msg), $msg, 1) if $send_alert;
  172. return $changes;
  173. }
  174. #---------------------------------------------------------------------------------------------------------------
  175. sub unblock_user {
  176. my ($db, $user_id) = @_;
  177. return 0 unless $db && defined $user_id;
  178. # Валидация ID
  179. return 0 unless $user_id =~ /^\d+$/ && $user_id > 0;
  180. # Получаем пользователя
  181. my $user_record = get_record_sql($db, "SELECT * FROM user_list WHERE id = ?", $user_id);
  182. return 0 unless $user_record; # если нет — выходим
  183. # Формируем идентификатор
  184. my $user_ident = 'id:' . ($user_record->{id} // '') . ' ' . ($user_record->{login} // '');
  185. if ($user_record->{description}) {
  186. $user_ident .= '[' . $user_record->{description} . ']';
  187. }
  188. my $msg = "Amnistuyemo blocked by traffic user $user_ident\nInternet access for the user's IP address has been restored:\n";
  189. my $send_alert = 0;
  190. my $any_updated = 0;
  191. # Разблоковываем все активные IP-записи пользователя
  192. my @user_auth = get_records_sql($db, "SELECT * FROM user_auth WHERE deleted = 0 AND user_id = ?", $user_id);
  193. foreach my $record (@user_auth) {
  194. next unless $record->{id} && $record->{id} =~ /^\d+$/;
  195. $send_alert ||= isNotifyUpdate(get_notify_subnet($db, $record->{ip}));
  196. my $auth_ident = $record->{ip} // '';
  197. if ($record->{dns_name}) {
  198. $auth_ident .= '[' . $record->{dns_name} . ']';
  199. }
  200. if ($record->{description}) {
  201. $auth_ident .= ' :: ' . $record->{description};
  202. }
  203. my $new = {
  204. blocked => 0,
  205. changed => 1,
  206. };
  207. if (update_record($db, 'user_auth', $new, 'id = ?', $record->{id})) {
  208. $msg .= "\n" . $auth_ident;
  209. $any_updated = 1;
  210. }
  211. }
  212. # Разблоковываем самого пользователя в user_list
  213. my $user_update = { blocked => 0 };
  214. my $ret_id = update_record($db, 'user_list', $user_update, 'id = ?', $user_id);
  215. if ($ret_id) {
  216. # Логируем даже если нет IP-записей
  217. db_log_info($db, $msg);
  218. sendEmail("WARN! " . get_first_line($msg), $msg, 1) if $send_alert;
  219. }
  220. return $ret_id;
  221. }
  222. #---------------------------------------------------------------------------------------------------------------
  223. sub delete_user {
  224. my ($db, $id) = @_;
  225. return 0 unless $db && defined $id;
  226. # Валидация ID: должно быть положительное целое число
  227. return 0 unless $id =~ /^\d+$/ && $id > 0;
  228. # Удаляем основную запись пользователя
  229. my $changes = delete_record($db, "user_list", "id = ?", $id);
  230. return 0 unless $changes; # если не удалось — выходим
  231. # Удаляем все IP-записи (user_auth)
  232. my @user_auth_records = get_records_sql($db, "SELECT id FROM user_auth WHERE user_id = ?", $id);
  233. foreach my $row (@user_auth_records) {
  234. next unless defined $row->{id} && $row->{id} =~ /^\d+$/;
  235. delete_user_auth($db, $row->{id});
  236. }
  237. # Удаляем устройство, привязанное к пользователю
  238. my $device = get_record_sql($db, "SELECT id FROM devices WHERE user_id = ?", $id);
  239. if ($device && defined $device->{id} && $device->{id} =~ /^\d+$/) {
  240. delete_device($db, $device->{id});
  241. }
  242. # Удаляем правила авторизации
  243. do_sql($db, "DELETE FROM auth_rules WHERE user_id = ?", $id);
  244. return $changes;
  245. }
  246. #---------------------------------------------------------------------------------------------------------------
  247. sub delete_device {
  248. my ($db, $id) = @_;
  249. return 0 unless $db && defined $id;
  250. # Валидация: ID должен быть положительным целым числом
  251. return 0 unless $id =~ /^\d+$/ && $id > 0;
  252. # Удаляем запись устройства
  253. my $changes = delete_record($db, "devices", "id = ?", $id);
  254. return 0 unless $changes; # если не удалось — выходим
  255. # Отвязываем порты
  256. unbind_ports($db, $id);
  257. # Удаляем связанные данные
  258. do_sql($db, "DELETE FROM connections WHERE device_id = ?", $id);
  259. do_sql($db, "DELETE FROM device_l3_interfaces WHERE device_id = ?", $id);
  260. do_sql($db, "DELETE FROM device_ports WHERE device_id = ?", $id);
  261. do_sql($db, "DELETE FROM device_filter_instances WHERE device_id = ?", $id);
  262. do_sql($db, "DELETE FROM gateway_subnets WHERE device_id = ?", $id);
  263. return $changes;
  264. }
  265. #---------------------------------------------------------------------------------------------------------------
  266. sub is_hotspot {
  267. my ($db, $ip) = @_;
  268. return 0 unless $db && defined $ip;
  269. my @subnets = get_records_sql(
  270. $db,
  271. "SELECT subnet FROM subnets WHERE hotspot = 1 AND LENGTH(subnet) > 0"
  272. );
  273. my $pat = Net::Patricia->new;
  274. for my $row (@subnets) {
  275. $pat->add_string($row->{subnet}) if defined $row->{subnet};
  276. }
  277. return $pat->match_string($ip) ? 1 : 0;
  278. }
  279. #---------------------------------------------------------------------------------------------------------------
  280. sub get_office_subnet {
  281. my ($db, $ip) = @_;
  282. return undef unless $db && defined $ip;
  283. my @rows = get_records_sql(
  284. $db,
  285. "SELECT * FROM subnets WHERE office = 1 AND LENGTH(subnet) > 0"
  286. );
  287. return undef unless @rows;
  288. my $pat = Net::Patricia->new;
  289. for my $row (@rows) {
  290. next unless defined $row->{subnet};
  291. # Защита от некорректных подсетей в БД
  292. eval { $pat->add_string($row->{subnet}, $row); 1 } or next;
  293. }
  294. return $pat->match_string($ip);
  295. }
  296. #---------------------------------------------------------------------------------------------------------------
  297. sub get_notify_subnet {
  298. my $db = shift;
  299. my $ip = shift;
  300. my $notify_flag = get_office_subnet($db,$ip);
  301. if ($notify_flag) { return $notify_flag->{notify}; }
  302. return 0;
  303. }
  304. #---------------------------------------------------------------------------------------------------------------
  305. sub get_new_user_id {
  306. my ($db, $ip, $mac, $hostname) = @_;
  307. return unless $db;
  308. my $result = {
  309. ip => $ip,
  310. mac => defined $mac ? mac_splitted(mac_simplify($mac)) : undef,
  311. dhcp_hostname => $hostname,
  312. ou_id => undef,
  313. user_id => undef,
  314. };
  315. # --- Hotspot ---
  316. my @hotspot_rules = get_records_sql($db,
  317. "SELECT * FROM subnets WHERE hotspot = 1 AND LENGTH(subnet) > 0"
  318. );
  319. if (@hotspot_rules) {
  320. my $hotspot_pat = Net::Patricia->new;
  321. foreach my $row (@hotspot_rules) {
  322. next unless defined $row->{subnet};
  323. eval { $hotspot_pat->add_string($row->{subnet}, $default_hotspot_ou_id); 1 } or next;
  324. }
  325. if (defined $ip) {
  326. my $ou_id = $hotspot_pat->match_string($ip);
  327. if ($ou_id) { $result->{ou_id} = $ou_id; return $result; }
  328. }
  329. }
  330. # --- Поиск user_id по IP/MAC/hostname ---
  331. if (defined $ip && $ip) {
  332. my @rules = get_records_sql($db,
  333. "SELECT rule, user_id FROM auth_rules WHERE rule_type = 1 AND LENGTH(rule) > 0 AND user_id IS NOT NULL"
  334. );
  335. my $pat = Net::Patricia->new;
  336. foreach my $r (@rules) {
  337. next unless defined $r->{rule};
  338. eval { $pat->add_string($r->{rule}, $r->{user_id}); 1 } or next;
  339. }
  340. if (my $user_id = $pat->match_string($ip)) {
  341. $result->{user_id} = $user_id;
  342. return $result;
  343. }
  344. }
  345. if (defined $mac && $mac) {
  346. my @rules = get_records_sql($db,
  347. "SELECT rule, user_id FROM auth_rules WHERE rule_type = 2 AND LENGTH(rule) > 0 AND user_id IS NOT NULL"
  348. );
  349. foreach my $r (@rules) {
  350. next unless defined $r->{rule};
  351. my $rule_clean = mac_simplify($r->{rule});
  352. # Защита от битых регулярок
  353. eval {
  354. if ($mac =~ /\Q$rule_clean\E/i) { # \Q...\E — экранируем спецсимволы!
  355. $result->{user_id} = $r->{user_id};
  356. return $result;
  357. }
  358. 1;
  359. } or do {
  360. log_debug("Invalid MAC rule: '$r->{rule}'");
  361. next;
  362. };
  363. }
  364. }
  365. if (defined $hostname && $hostname) {
  366. my @rules = get_records_sql($db,
  367. "SELECT rule, user_id FROM auth_rules WHERE rule_type = 3 AND LENGTH(rule) > 0 AND user_id IS NOT NULL"
  368. );
  369. foreach my $r (@rules) {
  370. next unless defined $r->{rule};
  371. eval {
  372. if ($hostname =~ /$r->{rule}/i) {
  373. $result->{user_id} = $r->{user_id};
  374. return $result;
  375. }
  376. 1;
  377. } or do {
  378. log_debug("Invalid hostname rule: '$r->{rule}'");
  379. next;
  380. };
  381. }
  382. }
  383. # --- Поиск ou_id по IP/MAC/hostname ---
  384. if (defined $ip && $ip) {
  385. my @rules = get_records_sql($db,
  386. "SELECT rule, ou_id FROM auth_rules WHERE rule_type = 1 AND LENGTH(rule) > 0 AND ou_id IS NOT NULL"
  387. );
  388. my $pat = Net::Patricia->new;
  389. foreach my $r (@rules) {
  390. next unless defined $r->{rule};
  391. eval { $pat->add_string($r->{rule}, $r->{ou_id}); 1 } or next;
  392. }
  393. if (my $ou_id = $pat->match_string($ip)) {
  394. $result->{ou_id} = $ou_id;
  395. return $result;
  396. }
  397. }
  398. if (defined $mac && $mac) {
  399. my @rules = get_records_sql($db,
  400. "SELECT rule, ou_id FROM auth_rules WHERE rule_type = 2 AND LENGTH(rule) > 0 AND ou_id IS NOT NULL"
  401. );
  402. foreach my $r (@rules) {
  403. next unless defined $r->{rule};
  404. my $rule_clean = mac_simplify($r->{rule});
  405. eval {
  406. if ($mac =~ /\Q$rule_clean\E/i) {
  407. $result->{ou_id} = $r->{ou_id};
  408. return $result;
  409. }
  410. 1;
  411. } or do {
  412. log_debug("Invalid MAC rule: '$r->{rule}'");
  413. next;
  414. };
  415. }
  416. }
  417. if (defined $hostname && $hostname) {
  418. my @rules = get_records_sql($db,
  419. "SELECT rule, ou_id FROM auth_rules WHERE rule_type = 3 AND LENGTH(rule) > 0 AND ou_id IS NOT NULL"
  420. );
  421. foreach my $r (@rules) {
  422. next unless defined $r->{rule};
  423. eval {
  424. if ($hostname =~ /$r->{rule}/i) {
  425. $result->{ou_id} = $r->{ou_id};
  426. return $result;
  427. }
  428. 1;
  429. } or do {
  430. log_debug("Invalid hostname rule: '$r->{rule}'");
  431. next;
  432. };
  433. }
  434. }
  435. # --- Значение по умолчанию ---
  436. $result->{ou_id} //= $default_user_ou_id;
  437. return $result;
  438. }
  439. #---------------------------------------------------------------------------------------------------------------
  440. sub set_changed {
  441. my ($db, $id) = @_;
  442. return unless $db && defined $id;
  443. # Опционально: валидация ID как числа
  444. return unless $id =~ /^\d+$/;
  445. my $update_record = { changed => 1 };
  446. update_record($db, 'user_auth', $update_record, 'id = ?', $id);
  447. }
  448. #---------------------------------------------------------------------------------------------------------------
  449. sub update_dns_record {
  450. my ($hdb, $auth_id) = @_;
  451. return unless $config_ref{enable_dns_updates};
  452. return unless defined $auth_id;
  453. # Валидация: auth_id должен быть положительным целым числом
  454. return unless $auth_id =~ /^\d+$/ && $auth_id > 0;
  455. # Переподключение
  456. if (!$hdb || !$hdb->ping) { $hdb = init_db(); }
  457. return unless $hdb;
  458. # Получаем настройки
  459. my $ad_zone = get_option($hdb, 33);
  460. my $ad_dns = get_option($hdb, 3);
  461. my $enable_ad_dns_update = ($ad_zone && $ad_dns && $config_ref{enable_dns_updates});
  462. log_debug("Auth id: $auth_id");
  463. log_debug("enable_ad_dns_update: " . ($enable_ad_dns_update ? '1' : '0'));
  464. log_debug("DNS update flags - zone: $ad_zone, dns: $ad_dns, enable_ad_dns_update: " . ($enable_ad_dns_update ? '1' : '0'));
  465. # Получаем задачи из очереди
  466. my @dns_queue = get_records_sql(
  467. $hdb,
  468. "SELECT * FROM dns_queue WHERE auth_id = ? AND value > '' AND value NOT LIKE '%.' ORDER BY id ASC",
  469. $auth_id
  470. );
  471. return unless @dns_queue;
  472. foreach my $dns_cmd (@dns_queue) {
  473. my $fqdn = '';
  474. my $fqdn_ip = '';
  475. my $fqdn_parent = '';
  476. my $static_exists = 0;
  477. my $static_ref = '';
  478. my $static_ok = 0;
  479. eval {
  480. if ($dns_cmd->{name_type}=~/^cname$/i) {
  481. #skip update unknown domain
  482. if ($dns_cmd->{name} =~/\.$/ or $dns_cmd->{value} =~/\.$/) { next; }
  483. $fqdn=lc($dns_cmd->{name});
  484. $fqdn=~s/\.$ad_zone$//i;
  485. # $fqdn=~s/\.$//;
  486. if ($dns_cmd->{value}) {
  487. $fqdn_parent=lc($dns_cmd->{value});
  488. $fqdn_parent=~s/\.$ad_zone$//i;
  489. # $fqdn_parent=~s/\.$//;
  490. }
  491. $fqdn = $fqdn.".".$ad_zone;
  492. $fqdn_parent = $fqdn_parent.".".$ad_zone;
  493. #remove cname
  494. if ($dns_cmd->{operation_type} eq 'del') {
  495. delete_dns_cname($fqdn_parent,$fqdn,$ad_zone,$ad_dns,$hdb);
  496. }
  497. #create cname
  498. if ($dns_cmd->{operation_type} eq 'add') {
  499. create_dns_cname($fqdn_parent,$fqdn,$ad_zone,$ad_dns,$hdb);
  500. }
  501. }
  502. if ($dns_cmd->{name_type}=~/^a$/i) {
  503. #skip update unknown domain
  504. if ($dns_cmd->{name} =~/\.$/ or $dns_cmd->{value} =~/\.$/) { next; }
  505. $fqdn=lc($dns_cmd->{name});
  506. $fqdn=~s/\.$ad_zone$//i;
  507. # $fqdn=~s/\.$//;
  508. if (!$dns_cmd->{value}) { next; }
  509. $fqdn_ip=lc($dns_cmd->{value});
  510. $fqdn = $fqdn.".".$ad_zone;
  511. #dns update disabled?
  512. my $maybe_update_dns=( $enable_ad_dns_update and $office_networks->match_string($fqdn_ip) );
  513. if (!$maybe_update_dns) {
  514. db_log_info($hdb,"FOUND Auth_id: $auth_id. DNS update disabled.");
  515. next;
  516. }
  517. #get aliases
  518. my @aliases = get_records_sql($hdb, "SELECT * FROM user_auth_alias WHERE auth_id = ?", $auth_id);
  519. #remove A & PTR
  520. if ($dns_cmd->{operation_type} eq 'del') {
  521. #remove aliases
  522. if (@aliases and scalar @aliases) {
  523. foreach my $alias (@aliases) {
  524. delete_dns_cname($fqdn,$alias->{alias},$ad_zone,$ad_dns,$hdb) if ($alias->{alias});
  525. delete_dns_hostname($fqdn,$alias->{alias},$ad_zone,$ad_dns,$hdb) if ($alias->{alias});
  526. }
  527. }
  528. #remove main record
  529. delete_dns_hostname($fqdn,$fqdn_ip,$ad_zone,$ad_dns,$hdb);
  530. delete_dns_ptr($fqdn,$fqdn_ip,$ad_zone,$ad_dns,$hdb);
  531. }
  532. #create A & PTR
  533. if ($dns_cmd->{operation_type} eq 'add') {
  534. my @dns_record=ResolveNames($fqdn,$dns_server);
  535. $static_exists = (scalar @dns_record>0);
  536. if ($static_exists) {
  537. $static_ref = join(' ',@dns_record);
  538. foreach my $dns_a (@dns_record) {
  539. if ($dns_a=~/^$fqdn_ip$/) { $static_ok = 1; }
  540. }
  541. db_log_debug($hdb,"Dns record for static record $fqdn: $static_ref");
  542. }
  543. #skip update if already exists
  544. if ($static_ok) {
  545. db_log_debug($hdb,"Static record for $fqdn [$static_ok] correct.");
  546. next;
  547. }
  548. #create record
  549. create_dns_hostname($fqdn,$fqdn_ip,$ad_zone,$ad_dns,$hdb);
  550. create_dns_ptr($fqdn,$fqdn_ip,$ad_zone,$ad_dns,$hdb);
  551. #create aliases
  552. if (@aliases and scalar @aliases) {
  553. foreach my $alias (@aliases) {
  554. create_dns_cname($fqdn,$alias->{alias},$ad_zone,$ad_dns,$hdb) if ($alias->{alias});
  555. }
  556. }
  557. }
  558. }
  559. #PTR
  560. if ($dns_cmd->{name_type}=~/^ptr$/i) {
  561. $fqdn=lc($dns_cmd->{name});
  562. $fqdn=~s/\.$ad_zone$//i;
  563. # $fqdn=~s/\.$//;
  564. if (!$dns_cmd->{value}) { next; }
  565. $fqdn_ip=lc($dns_cmd->{value});
  566. #skip update unknown domain
  567. if ($fqdn =~/\.$/) { next; }
  568. $fqdn = $fqdn.".".$ad_zone;
  569. #dns update disabled?
  570. my $maybe_update_dns=( $enable_ad_dns_update and $office_networks->match_string($fqdn_ip) );
  571. if (!$maybe_update_dns) {
  572. db_log_info($hdb,"FOUND Auth_id: $auth_id. DNS update disabled.");
  573. next;
  574. }
  575. #remove A & PTR
  576. if ($dns_cmd->{operation_type} eq 'del') {
  577. #remove main record
  578. delete_dns_ptr($fqdn,$fqdn_ip,$ad_zone,$ad_dns,$hdb);
  579. }
  580. #create A & PTR
  581. if ($dns_cmd->{operation_type} eq 'add') {
  582. #create record
  583. create_dns_ptr($fqdn,$fqdn_ip,$ad_zone,$ad_dns,$hdb);
  584. }
  585. }
  586. };
  587. if ($@) { log_error("Error dns commands: $@"); }
  588. }
  589. }
  590. #---------------------------------------------------------------------------------------------------------------
  591. sub is_ad_computer {
  592. my ($hdb, $computer_name) = @_;
  593. return 0 unless $hdb;
  594. return 0 if !$computer_name || $computer_name =~ /UNDEFINED/i;
  595. my $ad_check = get_option($hdb, 73);
  596. return 1 unless $ad_check;
  597. my $ad_zone = get_option($hdb, 33);
  598. # Проверка домена (если указан)
  599. if (defined $ad_zone && $ad_zone ne '' && $computer_name =~ /\./) {
  600. if ($computer_name !~ /\Q$ad_zone\E$/i) {
  601. db_log_verbose($hdb, "The domain of the computer $computer_name does not match the domain of the organization $ad_zone. Skip update.");
  602. return 0;
  603. }
  604. }
  605. # Извлекаем NetBIOS-имя (до первой точки)
  606. my $netbios_name = $computer_name;
  607. $netbios_name = $1 if $computer_name =~ /^([^\.]+)/;
  608. # Валидация NetBIOS-имени
  609. if (!$netbios_name || $netbios_name !~ /^[a-zA-Z0-9][a-zA-Z0-9_\-\$]{0,14}$/) {
  610. db_log_verbose($hdb, "Invalid computer name format: '$computer_name'");
  611. return 0;
  612. }
  613. # Проверяем кэш
  614. my $name_in_cache = get_record_sql($hdb, "SELECT * FROM ad_comp_cache WHERE name = ?", $netbios_name);
  615. return 1 if $name_in_cache;
  616. # Ищем в AD
  617. my $ad_computer_name = $netbios_name . '$';
  618. my $safe_name = quotemeta($ad_computer_name);
  619. my %name_found = do_exec_ref("/usr/bin/getent passwd $safe_name");
  620. if (!$name_found{output} || $name_found{status} ne 0) {
  621. db_log_verbose($hdb, "The computer " . uc($ad_computer_name) . " was not found in the domain $ad_zone. Skip update.");
  622. return 0;
  623. }
  624. # Кэшируем
  625. do_sql($hdb, "INSERT INTO ad_comp_cache (name) VALUES (?) ON DUPLICATE KEY UPDATE name = ?",
  626. $netbios_name, $netbios_name);
  627. return 1;
  628. }
  629. #---------------------------------------------------------------------------------------------------------------
  630. sub escape_like {
  631. my ($str) = @_;
  632. return '' unless defined $str;
  633. $str =~ s/([%_\\])/\\$1/g;
  634. return $str;
  635. }
  636. #---------------------------------------------------------------------------------------------------------------
  637. sub update_dns_record_by_dhcp {
  638. my $hdb = shift;
  639. my $dhcp_record = shift;
  640. my $auth_record = shift;
  641. return if (!$config_ref{enable_dns_updates});
  642. my $ad_zone = get_option($hdb,33);
  643. my $ad_dns = get_option($hdb,3);
  644. $update_hostname_from_dhcp = get_option($hdb,46) || 0;
  645. my $subnets_dhcp = get_subnets_ref($hdb);
  646. my $enable_ad_dns_update = ($ad_zone and $ad_dns and $update_hostname_from_dhcp);
  647. log_debug("Dhcp record: ".Dumper($dhcp_record));
  648. log_debug("Subnets: ".Dumper($subnets_dhcp->{$dhcp_record->{network}->{subnet}}));
  649. log_debug("enable_ad_dns_update: ".$enable_ad_dns_update);
  650. log_debug("DNS update flags - zone: ".$ad_zone.",dns: ".$ad_dns.", update_hostname_from_dhcp: ".$update_hostname_from_dhcp.", enable_ad_dns_update: " .
  651. $enable_ad_dns_update. ", network dns-update enabled: ".$subnets_dhcp->{$dhcp_record->{network}->{subnet}}->{dhcp_update_hostname});
  652. my $maybe_update_dns=($enable_ad_dns_update and $subnets_dhcp->{$dhcp_record->{network}->{subnet}}->{dhcp_update_hostname} and
  653. (is_ad_computer($hdb,$dhcp_record->{hostname_utf8}) and ($dhcp_record->{type}=~/add/i or $dhcp_record->{type}=~/old/i)));
  654. if (!$maybe_update_dns) {
  655. db_log_debug($hdb,"FOUND Auth_id: $auth_record->{id}. DNS update don't needed.");
  656. return 0;
  657. }
  658. log_debug("DNS update enabled.");
  659. #update dns block
  660. my $fqdn_static;
  661. if ($auth_record->{dns_name}) {
  662. $fqdn_static=lc($auth_record->{dns_name});
  663. if ($fqdn_static!~/\.$ad_zone$/i) {
  664. $fqdn_static=~s/\.$//;
  665. $fqdn_static=lc($fqdn_static.'.'.$ad_zone);
  666. }
  667. }
  668. my $fqdn=lc(trim($dhcp_record->{hostname_utf8}));
  669. if ($fqdn!~/\.$ad_zone$/i) {
  670. $fqdn=~s/\.$//;
  671. $fqdn=lc($fqdn.'.'.$ad_zone);
  672. }
  673. db_log_debug($hdb,"FOUND Auth_id: $auth_record->{id} dns_name: $fqdn_static dhcp_hostname: $fqdn");
  674. #check exists static dns name
  675. my $static_exists = 0;
  676. my $dynamic_exists = 0;
  677. my $static_ok = 0;
  678. my $dynamic_ok = 0;
  679. my $static_ref;
  680. my $dynamic_ref;
  681. if ($fqdn_static ne '') {
  682. my @dns_record=ResolveNames($fqdn_static,$dns_server);
  683. $static_exists = (scalar @dns_record>0);
  684. if ($static_exists) {
  685. $static_ref = join(' ',@dns_record);
  686. foreach my $dns_a (@dns_record) {
  687. if ($dns_a=~/^$dhcp_record->{ip}$/) { $static_ok = $dns_a; }
  688. }
  689. }
  690. } else { $static_ok = 1; }
  691. if ($fqdn ne '') {
  692. my @dns_record=ResolveNames($fqdn,$dns_server);
  693. $dynamic_exists = (scalar @dns_record>0);
  694. if ($dynamic_exists) {
  695. $dynamic_ref = join(' ',@dns_record);
  696. foreach my $dns_a (@dns_record) {
  697. if ($dns_a=~/^$dhcp_record->{ip}$/) { $dynamic_ok = $dns_a; }
  698. }
  699. }
  700. }
  701. db_log_debug($hdb,"Dns record for static record $fqdn_static: $static_ok");
  702. db_log_debug($hdb,"Dns record for dhcp-hostname $fqdn: $dynamic_ok");
  703. if ($fqdn_static ne '') {
  704. if (!$static_ok) {
  705. db_log_info($hdb,"Static record mismatch! Expected $fqdn_static => $dhcp_record->{ip}, recivied: $static_ref");
  706. if (!$static_exists) {
  707. db_log_info($hdb,"Static dns hostname defined but not found. Create it ($fqdn_static => $dhcp_record->{ip})!");
  708. create_dns_hostname($fqdn_static,$dhcp_record->{ip},$ad_zone,$ad_dns,$hdb);
  709. }
  710. } else {
  711. db_log_debug($hdb,"Static record for $fqdn_static [$static_ok] correct.");
  712. }
  713. }
  714. if ($fqdn ne '' and $dynamic_ok ne '') { db_log_debug($hdb,"Dynamic record for $fqdn [$dynamic_ok] correct. No changes required."); }
  715. if ($fqdn ne '' and !$dynamic_ok) {
  716. log_error("Dynamic record mismatch! Expected: $fqdn => $dhcp_record->{ip}, recivied: $dynamic_ref. Checking the status.");
  717. #check exists hostname
  718. my $another_hostname_exists = 0;
  719. my @conditions;
  720. my @params;
  721. # Первое условие: по hostname_utf8
  722. my $prefix1 = lc($dhcp_record->{hostname_utf8} // '');
  723. if ($prefix1 ne '') {
  724. push @conditions, 'LOWER(dns_name) LIKE ? ';
  725. push @params, $prefix1 . '%';
  726. }
  727. # Второе условие: по dns_name (если нужно)
  728. if ($fqdn_static ne '' && $fqdn !~ /\Q$fqdn_static\E/) {
  729. my $prefix2 = lc($auth_record->{dns_name} // '');
  730. if ($prefix2 ne '') {
  731. push @conditions, 'LOWER(dns_name) LIKE ? ';
  732. push @params, $prefix2 . '%';
  733. }
  734. }
  735. return unless @conditions;
  736. my $cond_sql = join(' OR ', @conditions);
  737. my $filter_sql = "SELECT * FROM user_auth WHERE id <> ? AND deleted = 0 AND ($cond_sql) ORDER BY last_found DESC";
  738. unshift @params, $auth_record->{id};
  739. db_log_debug($hdb, "Search by DNS name prefixes: $cond_sql with params: [" . join(', ', map { "'$_'" } @params) . "]");
  740. my $name_record = get_record_sql($hdb, $filter_sql, @params);
  741. if ($name_record->{dns_name} =~/^$fqdn$/i or $name_record->{dns_name} =~/^$dhcp_record->{hostname_utf8}$/i) {
  742. $another_hostname_exists = 1;
  743. }
  744. if (!$another_hostname_exists) {
  745. if ($fqdn_static and $fqdn_static ne '') {
  746. if ($fqdn_static!~/$fqdn/) {
  747. db_log_info($hdb,"Hostname from dhcp request $fqdn differs from static dns hostname $fqdn_static. Ignore dynamic binding!");
  748. # delete_dns_hostname($fqdn,$dhcp_record->{ip},$ad_zone,$ad_dns,$hdb);
  749. # create_dns_hostname($fqdn,$dhcp_record->{ip},$ad_zone,$ad_dns,$hdb);
  750. }
  751. } else {
  752. db_log_info($hdb,"Rewrite aliases if exists for $fqdn => $dhcp_record->{ip}");
  753. #get and remove aliases
  754. my @aliases = get_records_sql($hdb, "SELECT * FROM user_auth_alias WHERE auth_id = ?", $auth_record->{id});
  755. if (@aliases and scalar @aliases) {
  756. foreach my $alias (@aliases) {
  757. delete_dns_cname($fqdn_static,$alias->{alias},$ad_zone,$ad_dns,$hdb) if ($alias->{alias});
  758. }
  759. }
  760. db_log_info($hdb,"Static dns hostname not defined. Create dns record by dhcp request. $fqdn => $dhcp_record->{ip}");
  761. create_dns_hostname($fqdn,$dhcp_record->{ip},$ad_zone,$ad_dns,$hdb);
  762. if (@aliases and scalar @aliases) {
  763. foreach my $alias (@aliases) {
  764. create_dns_cname($fqdn_static,$alias->{alias},$ad_zone,$ad_dns,$hdb) if ($alias->{alias});
  765. }
  766. }
  767. }
  768. } else {
  769. db_log_error($hdb,"Found another record with some hostname id: $name_record->{id} ip: $name_record->{ip} hostname: $name_record->{dns_name}. Skip update.");
  770. }
  771. }
  772. #end update dns block
  773. }
  774. #------------------------------------------------------------------------------------------------------------
  775. use DateTime::Format::Strptime;
  776. sub apply_device_lock {
  777. my $db = shift;
  778. my $device_id = shift;
  779. my $iteration = shift || 0;
  780. $iteration++;
  781. if ($iteration > 2) { return 0; }
  782. my $dev = get_record_sql($db, "SELECT discovery_locked, locked_timestamp FROM devices WHERE id = ?", $device_id);
  783. if (!$dev) { return 0; }
  784. if (!$dev->{'discovery_locked'}) {
  785. return set_lock_discovery($db, $device_id);
  786. }
  787. my $ts_str = $dev->{'locked_timestamp'};
  788. # Если locked_timestamp NULL или пустой — устанавливаем блокировку
  789. if (!defined $ts_str || $ts_str eq '' || $ts_str eq '0000-00-00 00:00:00') {
  790. return set_lock_discovery($db, $device_id);
  791. }
  792. # Удаляем микросекунды (PostgreSQL) для совместимости с форматом
  793. $ts_str =~ s/\.\d+$//;
  794. # Парсим строку в DateTime
  795. my $parser = DateTime::Format::Strptime->new(
  796. pattern => '%Y-%m-%d %H:%M:%S',
  797. on_error => 'croak',
  798. );
  799. my $dt;
  800. eval {
  801. $dt = $parser->parse_datetime($ts_str);
  802. };
  803. if ($@ || !$dt) {
  804. # Ошибка парсинга — считаем блокировку недействительной
  805. return set_lock_discovery($db, $device_id);
  806. }
  807. # Получаем Unix timestamp
  808. my $u_locked_timestamp = $dt->epoch;
  809. # Ждём окончания блокировки (30 секунд)
  810. my $wait_time = ($u_locked_timestamp + 30) - time();
  811. if ($wait_time <= 0) {
  812. return set_lock_discovery($db, $device_id);
  813. }
  814. sleep($wait_time);
  815. return apply_device_lock($db, $device_id, $iteration);
  816. }
  817. #------------------------------------------------------------------------------------------------------------
  818. sub set_lock_discovery {
  819. my $db = shift;
  820. my $device_id = shift;
  821. my $new;
  822. $new->{'discovery_locked'} = 1;
  823. $new->{'locked_timestamp'} = GetNowTime();
  824. if (update_record($db,'devices',$new,'id=?', $device_id)) { return 1; }
  825. return 0;
  826. }
  827. #------------------------------------------------------------------------------------------------------------
  828. sub unset_lock_discovery {
  829. my $db = shift;
  830. my $device_id = shift;
  831. my $new;
  832. $new->{'discovery_locked'} = 0;
  833. $new->{'locked_timestamp'} = GetNowTime();
  834. if (update_record($db,'devices',$new,'id=?',$device_id)) { return 1; }
  835. return 0;
  836. }
  837. #------------------------------------------------------------------------------------------------------------
  838. sub create_dns_cname {
  839. my $fqdn = shift;
  840. my $alias = shift;
  841. my $zone = shift;
  842. my $server = shift;
  843. my $db = shift;
  844. #skip update domain controllers
  845. if (!$db) {
  846. log_info("DNS-UPDATE: Add => Zone $zone Server: $server CNAME: $alias for $fqdn");
  847. } else {
  848. db_log_info($db,"DNS-UPDATE: Add => Zone $zone Server: $server CNAME: $alias for $fqdn ");
  849. }
  850. my $ad_zone = get_option($db,33);
  851. my $nsupdate_file = "/tmp/".$fqdn."-nsupdate";
  852. my @add_dns;
  853. if ($config_ref{dns_server_type}=~/windows/i) {
  854. push(@add_dns,"gsstsig");
  855. push(@add_dns,"server $server");
  856. push(@add_dns,"zone $zone");
  857. push(@add_dns,"update add $alias 3600 cname $fqdn.");
  858. push(@add_dns,"send");
  859. write_to_file($nsupdate_file,\@add_dns);
  860. do_exec('/usr/bin/kinit -k -t /opt/Eye/scripts/cfg/dns_updater.keytab dns_updater@'.uc($ad_zone).' && /usr/bin/nsupdate "'.$nsupdate_file.'"');
  861. }
  862. if ($config_ref{dns_server_type}=~/bind/i) {
  863. push(@add_dns,"server $server");
  864. push(@add_dns,"zone $zone");
  865. push(@add_dns,"update add $alias 3600 cname $fqdn.");
  866. push(@add_dns,"send");
  867. write_to_file($nsupdate_file,\@add_dns);
  868. do_exec('/usr/bin/nsupdate -k /etc/bind/rndc.key "'.$nsupdate_file.'"');
  869. }
  870. if (-e "$nsupdate_file") { unlink "$nsupdate_file"; }
  871. }
  872. #---------------------------------------------------------------------------------------------------------------
  873. sub delete_dns_cname {
  874. my $fqdn = shift;
  875. my $alias = shift;
  876. my $zone = shift;
  877. my $server = shift;
  878. my $db = shift;
  879. if (!$db) {
  880. log_info("DNS-UPDATE: Delete => Zone $zone Server: $server CNAME: $alias for $fqdn ");
  881. } else {
  882. db_log_info($db,"DNS-UPDATE: Delete => Zone $zone Server: $server CNAME: $alias for $fqdn");
  883. }
  884. my $ad_zone = get_option($db,33);
  885. my $nsupdate_file = "/tmp/".$fqdn."-nsupdate";
  886. my @add_dns;
  887. if ($config_ref{dns_server_type}=~/windows/i) {
  888. push(@add_dns,"gsstsig");
  889. push(@add_dns,"server $server");
  890. push(@add_dns,"zone $zone");
  891. push(@add_dns,"update delete $alias cname ");
  892. push(@add_dns,"send");
  893. write_to_file($nsupdate_file,\@add_dns);
  894. do_exec('/usr/bin/kinit -k -t /opt/Eye/scripts/cfg/dns_updater.keytab dns_updater@'.uc($ad_zone).' && /usr/bin/nsupdate "'.$nsupdate_file.'"');
  895. }
  896. if ($config_ref{dns_server_type}=~/bind/i) {
  897. push(@add_dns,"server $server");
  898. push(@add_dns,"zone $zone");
  899. push(@add_dns,"update delete $alias cname");
  900. push(@add_dns,"send");
  901. write_to_file($nsupdate_file,\@add_dns);
  902. do_exec('/usr/bin/nsupdate -k /etc/bind/rndc.key "'.$nsupdate_file.'"');
  903. }
  904. if (-e "$nsupdate_file") { unlink "$nsupdate_file"; }
  905. }
  906. #------------------------------------------------------------------------------------------------------------
  907. sub create_dns_hostname {
  908. my $fqdn = shift;
  909. my $ip = shift;
  910. my $zone = shift;
  911. my $server = shift;
  912. my $db = shift;
  913. #skip update domain controllers
  914. if ($fqdn=~/^dc[0-9]{1,2}\./i) { return; }
  915. if (!$db) {
  916. log_info("DNS-UPDATE: Add => Zone $zone Server: $server A: $fqdn IP: $ip");
  917. } else {
  918. db_log_info($db,"DNS-UPDATE: Add => Zone $zone Server: $server A: $fqdn IP: $ip");
  919. }
  920. my $ad_zone = get_option($db,33);
  921. my $nsupdate_file = "/tmp/".$fqdn."-nsupdate";
  922. my @add_dns;
  923. if ($config_ref{dns_server_type}=~/windows/i) {
  924. push(@add_dns,"gsstsig");
  925. push(@add_dns,"server $server");
  926. push(@add_dns,"zone $zone");
  927. push(@add_dns,"update add $fqdn 3600 A $ip");
  928. push(@add_dns,"send");
  929. write_to_file($nsupdate_file,\@add_dns);
  930. do_exec('/usr/bin/kinit -k -t /opt/Eye/scripts/cfg/dns_updater.keytab dns_updater@'.uc($ad_zone).' && /usr/bin/nsupdate "'.$nsupdate_file.'"');
  931. }
  932. if ($config_ref{dns_server_type}=~/bind/i) {
  933. push(@add_dns,"server $server");
  934. push(@add_dns,"zone $zone");
  935. push(@add_dns,"update add $fqdn 3600 A $ip");
  936. push(@add_dns,"send");
  937. write_to_file($nsupdate_file,\@add_dns);
  938. do_exec('/usr/bin/nsupdate -k /etc/bind/rndc.key "'.$nsupdate_file.'"');
  939. }
  940. if (-e "$nsupdate_file") { unlink "$nsupdate_file"; }
  941. }
  942. #---------------------------------------------------------------------------------------------------------------
  943. sub delete_dns_hostname {
  944. my $fqdn = shift;
  945. my $ip = shift;
  946. my $zone = shift;
  947. my $server = shift;
  948. my $db = shift;
  949. #skip update domain controllers
  950. if ($fqdn=~/^dc[0-9]{1,2}\./i) { return; }
  951. if (!$db) {
  952. log_info("DNS-UPDATE: Delete => Zone $zone Server: $server A: $fqdn IP: $ip");
  953. } else {
  954. db_log_info($db,"DNS-UPDATE: Delete => Zone $zone Server: $server A: $fqdn IP: $ip");
  955. }
  956. my $ad_zone = get_option($db,33);
  957. my $nsupdate_file = "/tmp/".$fqdn."-nsupdate";
  958. my @add_dns;
  959. if ($config_ref{dns_server_type}=~/windows/i) {
  960. push(@add_dns,"gsstsig");
  961. push(@add_dns,"server $server");
  962. push(@add_dns,"zone $zone");
  963. push(@add_dns,"update delete $fqdn A");
  964. push(@add_dns,"send");
  965. write_to_file($nsupdate_file,\@add_dns);
  966. do_exec('/usr/bin/kinit -k -t /opt/Eye/scripts/cfg/dns_updater.keytab dns_updater@'.uc($ad_zone).' && /usr/bin/nsupdate "'.$nsupdate_file.'"');
  967. }
  968. if ($config_ref{dns_server_type}=~/bind/i) {
  969. push(@add_dns,"server $server");
  970. push(@add_dns,"zone $zone");
  971. push(@add_dns,"update delete $fqdn A");
  972. push(@add_dns,"send");
  973. write_to_file($nsupdate_file,\@add_dns);
  974. do_exec('/usr/bin/nsupdate -k /etc/bind/rndc.key "'.$nsupdate_file.'"');
  975. }
  976. if (-e "$nsupdate_file") { unlink "$nsupdate_file"; }
  977. }
  978. #---------------------------------------------------------------------------------------------------------------
  979. sub create_dns_ptr {
  980. my $fqdn = shift;
  981. my $ip = shift;
  982. my $ad_zone = shift;
  983. my $server = shift;
  984. my $db = shift;
  985. my $radr;
  986. my $zone;
  987. #skip update domain controllers
  988. if ($fqdn=~/^dc[0-9]{1,2}\./i) { return; }
  989. if ($ip =~ /([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})(\/[0-9]{1,2}){0,1}/) {
  990. return 0 if($1 > 255 || $2 > 255 || $3 > 255 || $4 > 255);
  991. $radr = "$4.$3.$2.$1.in-addr.arpa";
  992. $zone = "$3.$2.$1.in-addr.arpa";
  993. }
  994. if (!$radr or !$zone) { return 0; }
  995. if (!$db) { return 0; }
  996. db_log_info($db,"DNS-UPDATE: Zone $zone Server: $server A: $fqdn PTR: $ip");
  997. my $nsupdate_file = "/tmp/".$radr."-nsupdate";
  998. my @add_dns;
  999. if ($config_ref{dns_server_type}=~/windows/i) {
  1000. push(@add_dns,"gsstsig");
  1001. push(@add_dns,"server $server");
  1002. push(@add_dns,"zone $zone");
  1003. push(@add_dns,"update add $radr 3600 PTR $fqdn.");
  1004. push(@add_dns,"send");
  1005. write_to_file($nsupdate_file,\@add_dns);
  1006. my $run_cmd = '/usr/bin/kinit -k -t /opt/Eye/scripts/cfg/dns_updater.keytab dns_updater@'.uc($ad_zone).' && /usr/bin/nsupdate "'.$nsupdate_file.'"';
  1007. do_exec($run_cmd);
  1008. }
  1009. if ($config_ref{dns_server_type}=~/bind/i) {
  1010. push(@add_dns,"server $server");
  1011. push(@add_dns,"zone $zone");
  1012. push(@add_dns,"update add $radr 3600 PTR $fqdn.");
  1013. push(@add_dns,"send");
  1014. write_to_file($nsupdate_file,\@add_dns);
  1015. my $run_cmd = '/usr/bin/nsupdate -k /etc/bind/rndc.key "'.$nsupdate_file.'"';
  1016. do_exec($run_cmd);
  1017. }
  1018. if (-e "$nsupdate_file") { unlink "$nsupdate_file"; }
  1019. }
  1020. #---------------------------------------------------------------------------------------------------------------
  1021. sub delete_dns_ptr {
  1022. my $fqdn = shift;
  1023. my $ip = shift;
  1024. my $ad_zone = shift;
  1025. my $server = shift;
  1026. my $db = shift;
  1027. my $radr;
  1028. my $zone;
  1029. #skip update domain controllers
  1030. if ($fqdn=~/^dc[0-9]{1,2}\./i) { return; }
  1031. if ($ip =~ /([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})(\/[0-9]{1,2}){0,1}/) {
  1032. return 0 if($1 > 255 || $2 > 255 || $3 > 255 || $4 > 255);
  1033. $radr = "$4.$3.$2.$1.in-addr.arpa";
  1034. $zone = "$3.$2.$1.in-addr.arpa";
  1035. }
  1036. if (!$radr or !$zone) { return 0; }
  1037. if (!$db) { return 0; }
  1038. db_log_info($db,"DNS-UPDATE: Delete => Zone $zone Server: $server A: $fqdn PTR: $ip");
  1039. my $nsupdate_file = "/tmp/".$radr."-nsupdate";
  1040. my @add_dns;
  1041. if ($config_ref{dns_server_type}=~/windows/i) {
  1042. push(@add_dns,"gsstsig");
  1043. push(@add_dns,"server $server");
  1044. push(@add_dns,"zone $zone");
  1045. push(@add_dns,"update delete $radr PTR");
  1046. push(@add_dns,"send");
  1047. write_to_file($nsupdate_file,\@add_dns);
  1048. my $run_cmd = '/usr/bin/kinit -k -t /opt/Eye/scripts/cfg/dns_updater.keytab dns_updater@'.uc($ad_zone).' && /usr/bin/nsupdate "'.$nsupdate_file.'"';
  1049. do_exec($run_cmd);
  1050. }
  1051. if ($config_ref{dns_server_type}=~/bind/i) {
  1052. push(@add_dns,"server $server");
  1053. push(@add_dns,"zone $zone");
  1054. push(@add_dns,"update delete $radr PTR");
  1055. push(@add_dns,"send");
  1056. write_to_file($nsupdate_file,\@add_dns);
  1057. my $run_cmd = '/usr/bin/nsupdate -k /etc/bind/rndc.key "'.$nsupdate_file.'"';
  1058. do_exec($run_cmd);
  1059. }
  1060. if (-e "$nsupdate_file") { unlink "$nsupdate_file"; }
  1061. }
  1062. #---------------------------------------------------------------------------------------------------------------
  1063. sub new_user {
  1064. my ($db, $user_info) = @_;
  1065. return 0 unless $db && $user_info;
  1066. my $user = {};
  1067. # Формируем login: MAC приоритетен, иначе IP
  1068. if ($user_info->{mac}) {
  1069. $user->{login} = mac_splitted($user_info->{mac});
  1070. } else {
  1071. $user->{login} = $user_info->{ip} || 'unknown';
  1072. }
  1073. # Формируем description с указанием источника
  1074. my $base_desc = $user_info->{dhcp_hostname} || $user->{login};
  1075. if ($debug) {
  1076. $user->{description} = $base_desc. '['. get_creation_method() . ']';
  1077. } else {
  1078. $user->{description} = $base_desc;
  1079. }
  1080. # Генерация уникального логина
  1081. my $base_login = $user->{login};
  1082. my $like_pattern = $base_login . '%';
  1083. my $count_sql = "SELECT COUNT(*) AS rec_cnt FROM user_list WHERE login LIKE ? OR login = ?";
  1084. my $count_record = get_record_sql($db, $count_sql, $like_pattern, $base_login);
  1085. my $login_count = $count_record ? ($count_record->{rec_cnt} || 0) : 0;
  1086. if ($login_count > 0) {
  1087. $user->{login} = $base_login . '(' . ($login_count + 1) . ')';
  1088. }
  1089. # OU info
  1090. $user->{ou_id} = $user_info->{ou_id};
  1091. my $ou_info;
  1092. if ($user_info->{ou_id}) {
  1093. $ou_info = get_record_sql($db, "SELECT * FROM ou WHERE id = ?", $user_info->{ou_id});
  1094. }
  1095. if ($ou_info) {
  1096. $user->{enabled} = $ou_info->{enabled};
  1097. $user->{queue_id} = $ou_info->{queue_id};
  1098. $user->{filter_group_id} = $ou_info->{filter_group_id};
  1099. }
  1100. # Создаём пользователя
  1101. my $result = insert_record($db, "user_list", $user);
  1102. # Авто-правило по MAC
  1103. if ($result && $config_ref{auto_mac_rule} && $user_info->{mac}) {
  1104. insert_record($db, "auth_rules", {
  1105. user_id => $result,
  1106. rule_type => 2,
  1107. rule => mac_splitted($user_info->{mac}),
  1108. });
  1109. }
  1110. return $result;
  1111. }
  1112. #---------------------------------------------------------------------------------------------------------------
  1113. sub get_ip_subnet {
  1114. my ($db, $ip) = @_;
  1115. return unless $db && defined $ip && $ip ne '';
  1116. my $ip_aton = StrToIp($ip);
  1117. return unless defined $ip_aton && $ip_aton > 0;
  1118. my $user_subnet = get_record_sql($db,
  1119. "SELECT * FROM subnets WHERE (hotspot = 1 OR office = 1) AND ? BETWEEN ip_int_start AND ip_int_stop",
  1120. $ip_aton
  1121. );
  1122. return $user_subnet;
  1123. }
  1124. #---------------------------------------------------------------------------------------------------------------
  1125. sub find_mac_in_subnet {
  1126. my ($db, $ip, $mac) = @_;
  1127. return unless $db && defined $ip && defined $mac && $ip ne '' && $mac ne '';
  1128. my $ip_subnet = get_ip_subnet($db, $ip);
  1129. return unless $ip_subnet && defined $ip_subnet->{ip_int_start} && defined $ip_subnet->{ip_int_stop};
  1130. # Безопасный параметризованный запрос
  1131. my @t_auth = get_records_sql($db,
  1132. "SELECT * FROM user_auth
  1133. WHERE ip_int BETWEEN ? AND ?
  1134. AND mac = ?
  1135. AND deleted = 0
  1136. ORDER BY id",
  1137. $ip_subnet->{ip_int_start},
  1138. $ip_subnet->{ip_int_stop},
  1139. $mac
  1140. );
  1141. return unless @t_auth;
  1142. my $result = { count => 0, items => {} };
  1143. for my $i (0 .. $#t_auth) {
  1144. $result->{count}++;
  1145. $result->{items}{$result->{count}} = $t_auth[$i];
  1146. }
  1147. return $result;
  1148. }
  1149. #---------------------------------------------------------------------------------------------------------------
  1150. sub get_creation_method {
  1151. my $script_name = $config_ref{my_name} // (split('/', $0))[-1];
  1152. return 'dhcp' if $script_name eq 'dhcp-log.pl';
  1153. return 'netflow' if $script_name eq 'eye-statd.pl';
  1154. return 'arp' if $script_name eq 'fetch_new_arp.pl';
  1155. # По умолчанию — имя скрипта без расширения
  1156. $script_name =~ s/\.pl$//;
  1157. return $script_name || 'unknown';
  1158. }
  1159. #---------------------------------------------------------------------------------------------------------------
  1160. sub resurrection_auth {
  1161. my ($db, $ip_record) = @_;
  1162. return 0 unless $db && ref $ip_record eq 'HASH';
  1163. my $ip = $ip_record->{ip} // '';
  1164. my $mac = $ip_record->{mac} // '';
  1165. my $action = $ip_record->{type} // '';
  1166. my $hostname= $ip_record->{hostname_utf8} // '';
  1167. my $client_id = $ip_record->{client_id} // '';
  1168. return 0 if !$ip || !$mac;
  1169. # Подготавливаем ip_aton и hotspot
  1170. $ip_record->{ip_aton} //= StrToIp($ip);
  1171. $ip_record->{hotspot} //= is_hotspot($db, $ip);
  1172. my $auth_ident = "Found new ip-address: $ip";
  1173. $auth_ident .= " [$mac]" if $mac;
  1174. $auth_ident .= " :: $hostname" if $hostname;
  1175. my $ip_aton = $ip_record->{ip_aton};
  1176. return 0 unless defined $ip_aton;
  1177. my $timestamp = GetNowTime();
  1178. # --- Ищем существующую запись по IP+MAC ---
  1179. my $record = get_record_sql($db,
  1180. "SELECT * FROM user_auth WHERE deleted = 0 AND ip_int = ? AND mac = ?",
  1181. $ip_aton, $mac
  1182. );
  1183. my $new_record = {
  1184. last_found => $timestamp,
  1185. arp_found => $timestamp,
  1186. client_id => $client_id // undef,
  1187. };
  1188. # Если нашли — обновляем
  1189. if ($record && $record->{user_id}) {
  1190. if ($action =~ /^(add|old|del)$/i) {
  1191. $new_record->{dhcp_action} = $action;
  1192. $new_record->{created_by} = 'dhcp';
  1193. $new_record->{dhcp_time} = $timestamp;
  1194. $new_record->{dhcp_hostname} = $hostname if $hostname;
  1195. } else {
  1196. $new_record->{created_by} = $action // get_creation_method();
  1197. }
  1198. update_record($db, 'user_auth', $new_record, 'id = ?', $record->{id});
  1199. return $record->{id};
  1200. }
  1201. # --- Проверка статической подсети ---
  1202. my $user_subnet = $office_networks->match_string($ip);
  1203. if ($user_subnet && $user_subnet->{static}) {
  1204. db_log_warning($db, "Unknown ip+mac found in static subnet! Abort create record for ip: $ip mac: [$mac]");
  1205. return 0;
  1206. }
  1207. my $send_alert_update = isNotifyUpdate(get_notify_subnet($db, $ip));
  1208. my $send_alert_create = isNotifyCreate(get_notify_subnet($db, $ip));
  1209. # --- Ищем другие записи с этим MAC в той же подсети ---
  1210. my $mac_exists = find_mac_in_subnet($db, $ip, $mac);
  1211. # --- Ищем запись с тем же IP (но другим MAC) ---
  1212. my $ip_record_same = get_record_sql($db,
  1213. "SELECT * FROM user_auth WHERE ip_int = ? AND deleted = 0",
  1214. $ip_aton
  1215. );
  1216. my $msg = '';
  1217. if ($ip_record_same && $ip_record_same->{id}) {
  1218. if (!$ip_record_same->{mac}) {
  1219. # Обновляем запись без MAC
  1220. $msg = "$auth_ident\nUse auth record with no mac: " . hash_to_text($ip_record_same);
  1221. db_log_verbose($db, $msg);
  1222. $new_record->{mac} = $mac;
  1223. $new_record->{dhcp} = 0 if $mac_exists && $mac_exists->{count};
  1224. if ($action =~ /^(add|old|del)$/i) {
  1225. $new_record->{dhcp_action} = $action;
  1226. $new_record->{dhcp_time} = $timestamp;
  1227. $new_record->{created_by} = 'dhcp';
  1228. $new_record->{dhcp_hostname} = $hostname if $hostname;
  1229. } else {
  1230. $new_record->{created_by} = $action // get_creation_method();
  1231. }
  1232. update_record($db, 'user_auth', $new_record, 'id = ?', $ip_record_same->{id});
  1233. sendEmail("WARN! " . get_first_line($msg), $msg, 1) if $send_alert_update;
  1234. return $ip_record_same->{id};
  1235. } elsif ($ip_record_same->{mac}) {
  1236. # MAC изменился — удаляем старую запись
  1237. if (!$ip_record->{hotspot}) {
  1238. $msg = "For ip: $ip mac change detected! Old mac: [$ip_record_same->{mac}] New mac: [$mac]. Disable old auth_id: $ip_record_same->{id}";
  1239. db_log_warning($db, $msg, $ip_record_same->{id});
  1240. sendEmail("WARN! " . get_first_line($msg), $msg, 1) if $send_alert_update;
  1241. }
  1242. delete_user_auth($db, $ip_record_same->{id});
  1243. }
  1244. }
  1245. # --- Создаём нового пользователя, если нужно ---
  1246. my $new_user_info = get_new_user_id($db, $ip, $mac, $hostname);
  1247. my $new_user_id = $new_user_info->{user_id} // new_user($db, $new_user_info);
  1248. # --- Удаляем дубли с dynamic=1 ---
  1249. if ($mac_exists && $mac_exists->{items}) {
  1250. for my $dup_id (keys %{$mac_exists->{items}}) {
  1251. my $dup = $mac_exists->{items}{$dup_id};
  1252. next unless $dup && $dup->{dynamic};
  1253. delete_user_auth($db, $dup->{id});
  1254. }
  1255. }
  1256. # --- Повторная проверка ---
  1257. $mac_exists = find_mac_in_subnet($db, $ip, $mac);
  1258. $new_record->{dhcp} = 0 if $mac_exists && $mac_exists->{count};
  1259. # --- Готовим полную запись ---
  1260. $new_record->{ip_int} = $ip_aton;
  1261. $new_record->{ip} = $ip;
  1262. $new_record->{mac} = $mac;
  1263. $new_record->{user_id} = $new_user_id;
  1264. $new_record->{save_traf} = $save_detail;
  1265. $new_record->{deleted} = 0;
  1266. if ($action =~ /^(add|old|del)$/i) {
  1267. $new_record->{dhcp_action} = $action;
  1268. $new_record->{dhcp_time} = $timestamp;
  1269. $new_record->{created_by} = 'dhcp';
  1270. } else {
  1271. $new_record->{created_by} = $action // get_creation_method();
  1272. }
  1273. # --- Проверяем, существует ли уже такая запись ---
  1274. my $auth_exists = get_record_sql($db,
  1275. "SELECT id FROM user_auth WHERE ip_int = ? AND mac = ? LIMIT 1",
  1276. $ip_aton, $mac
  1277. );
  1278. my $cur_auth_id;
  1279. if ($auth_exists && $auth_exists->{id}) {
  1280. # Воскрешаем старую запись
  1281. $cur_auth_id = $auth_exists->{id};
  1282. $msg = "$auth_ident Resurrection auth_id: $cur_auth_id with ip: $ip and mac: $mac";
  1283. if (!$ip_record->{hotspot}) { db_log_warning($db, $msg); } else { db_log_info($db, $msg); }
  1284. update_record($db, 'user_auth', $new_record, 'id = ?', $cur_auth_id);
  1285. } else {
  1286. # Создаём новую
  1287. $cur_auth_id = insert_record($db, 'user_auth', $new_record);
  1288. if ($cur_auth_id) {
  1289. $msg = $auth_ident;
  1290. if (!$ip_record->{hotspot}) { db_log_warning($db, $msg); } else { db_log_info($db, $msg); }
  1291. }
  1292. }
  1293. return 0 unless $cur_auth_id;
  1294. # --- Дополняем данными из user_list и OU ---
  1295. my $user_record = get_record_sql($db, "SELECT * FROM user_list WHERE id = ?", $new_user_id);
  1296. if ($user_record) {
  1297. my $ou_info = get_record_sql($db, "SELECT * FROM ou WHERE id = ?", $user_record->{ou_id});
  1298. if ($ou_info && $ou_info->{dynamic}) {
  1299. my $life_duration = $ou_info->{life_duration} // 24;
  1300. my $hours = int($life_duration);
  1301. my $minutes = ($life_duration - $hours) * 60;
  1302. my $now = DateTime->now(time_zone => 'local');
  1303. my $end_life = $now->clone->add(hours => $hours, minutes => $minutes);
  1304. $new_record->{dynamic} = 1;
  1305. $new_record->{end_life} = $end_life->strftime('%Y-%m-%d %H:%M:%S');
  1306. }
  1307. $new_record->{ou_id} = $user_record->{ou_id};
  1308. $new_record->{description} = $user_record->{description};
  1309. $new_record->{filter_group_id} = $user_record->{filter_group_id};
  1310. $new_record->{queue_id} = $user_record->{queue_id};
  1311. $new_record->{enabled} = $user_record->{enabled} // 0;
  1312. update_record($db, 'user_auth', $new_record, 'id = ?', $cur_auth_id);
  1313. }
  1314. db_log_warning($db, $msg, $cur_auth_id);
  1315. sendEmail("WARN! " . get_first_line($msg), $msg . "\n" . record_to_txt($db, 'user_auth', $cur_auth_id), 1) if $send_alert_create;
  1316. return $cur_auth_id;
  1317. }
  1318. #---------------------------------------------------------------------------------------------------------------
  1319. sub new_auth {
  1320. my ($db, $ip) = @_;
  1321. return 0 unless $db && defined $ip && $ip ne '';
  1322. my $ip_aton = StrToIp($ip);
  1323. return 0 unless defined $ip_aton;
  1324. # Проверяем, существует ли уже запись с таким IP
  1325. my $record = get_record_sql($db,
  1326. "SELECT id FROM user_auth WHERE deleted = 0 AND ip_int = ?",
  1327. $ip_aton
  1328. );
  1329. return $record->{id} if $record && $record->{id};
  1330. # Получаем информацию о пользователе/OU
  1331. my $new_user_info = get_new_user_id($db, $ip, undef, undef);
  1332. return 0 unless $new_user_info;
  1333. my $new_user_id;
  1334. if ($new_user_info->{user_id}) {
  1335. $new_user_id = $new_user_info->{user_id};
  1336. } elsif ($new_user_info->{ou_id}) {
  1337. $new_user_id = new_user($db, $new_user_info);
  1338. }
  1339. return 0 unless $new_user_id;
  1340. my $send_alert = isNotifyCreate(get_notify_subnet($db, $ip));
  1341. # Получаем данные пользователя БЕЗОПАСНО
  1342. my $user_record = get_record_sql($db,
  1343. "SELECT * FROM user_list WHERE id = ?",
  1344. $new_user_id
  1345. );
  1346. return 0 unless $user_record;
  1347. my $timestamp = GetNowTime();
  1348. my $new_record = {
  1349. ip_int => $ip_aton,
  1350. ip => $ip,
  1351. user_id => $new_user_id,
  1352. save_traf => $save_detail,
  1353. deleted => 0,
  1354. created_by => get_creation_method(),
  1355. ou_id => $user_record->{ou_id},
  1356. filter_group_id => $user_record->{filter_group_id},
  1357. queue_id => $user_record->{queue_id},
  1358. enabled => $user_record->{enabled} // 0,
  1359. };
  1360. $new_record->{description} = $user_record->{description} if $user_record->{description};
  1361. my $cur_auth_id = insert_record($db, 'user_auth', $new_record);
  1362. if ($cur_auth_id) {
  1363. my $msg = "New ip created by ".get_creation_method()."! ip: $ip";
  1364. db_log_warning($db, $msg, $cur_auth_id);
  1365. sendEmail("WARN! " . get_first_line($msg), $msg, 1) if $send_alert;
  1366. }
  1367. return $cur_auth_id;
  1368. }
  1369. #--------------------------------------------------------------------------------------------------------------
  1370. sub get_dynamic_ou {
  1371. my $db = shift;
  1372. my @dynamic=();
  1373. my @ou_list = get_records_sql($db,"SELECT id FROM ou WHERE dynamic = 1");
  1374. foreach my $group (@ou_list) {
  1375. next if (!$group);
  1376. push(@dynamic,$group->{id});
  1377. }
  1378. return wantarray ? @dynamic : \@dynamic;
  1379. }
  1380. #--------------------------------------------------------------------------------------------------------------
  1381. sub get_default_ou {
  1382. my $db = shift;
  1383. my @dynamic=();
  1384. my $ou = get_record_sql($db,"SELECT id FROM ou WHERE default_users = 1");
  1385. if (!$ou) { push(@dynamic,0); } else { push(@dynamic,$ou->{'id'}); }
  1386. $ou = get_record_sql($db,"SELECT id FROM ou WHERE default_hotspot = 1");
  1387. if ($ou) { push(@dynamic,$ou->{id}); }
  1388. return wantarray ? @dynamic : \@dynamic;
  1389. }
  1390. #--------------------------------------------------------------------------------------------------------------
  1391. sub is_dynamic_ou {
  1392. my $db = shift;
  1393. my $ou_id = shift;
  1394. my @dynamic=get_dynamic_ou($db);
  1395. if (in_array(\@dynamic,$ou_id)) { return 1; }
  1396. return 0;
  1397. }
  1398. #--------------------------------------------------------------------------------------------------------------
  1399. sub is_default_ou {
  1400. my $db = shift;
  1401. my $ou_id = shift;
  1402. my @dynamic=get_default_ou($db);
  1403. if (in_array(\@dynamic,$ou_id)) { return 1; }
  1404. return 0;
  1405. }
  1406. #---------------------------------------------------------------------------------------------------------------
  1407. sub get_subnets_ref {
  1408. my $db = shift;
  1409. my @list=get_records_sql($db,'SELECT * FROM subnets ORDER BY ip_int_start');
  1410. my $list_ref;
  1411. foreach my $net (@list) {
  1412. next if (!$net->{subnet});
  1413. $list_ref->{$net->{subnet}}=$net;
  1414. }
  1415. return $list_ref;
  1416. }
  1417. #---------------------------------------------------------------------------------------------------------------
  1418. sub get_device_by_ip {
  1419. my ($db, $ip) = @_;
  1420. return unless $db && defined $ip && $ip ne '';
  1421. # Ищем устройство напрямую по IP
  1422. my $netdev = get_record_sql($db, "SELECT * FROM devices WHERE ip = ?", $ip);
  1423. return $netdev if $netdev && $netdev->{id} > 0;
  1424. # Ищем user_id по IP в user_auth
  1425. my $auth_rec = get_record_sql($db,
  1426. "SELECT user_id FROM user_auth WHERE ip = ? AND deleted = 0",
  1427. $ip
  1428. );
  1429. if ($auth_rec && defined $auth_rec->{user_id} && $auth_rec->{user_id} > 0) {
  1430. $netdev = get_record_sql($db,
  1431. "SELECT * FROM devices WHERE user_id = ?",
  1432. $auth_rec->{user_id}
  1433. );
  1434. return $netdev;
  1435. }
  1436. return;
  1437. }
  1438. #---------------------------------------------------------------------------------------------------------------
  1439. sub recalc_quotes {
  1440. my ($db, $calc_id) = @_;
  1441. $calc_id //= $$;
  1442. return unless get_option($db, 54);
  1443. clean_variables($db);
  1444. return if Get_Variable($db, 'RECALC');
  1445. my $timeshift = get_option($db, 55);
  1446. Set_Variable($db, 'RECALC', $calc_id, time() + $timeshift * 60);
  1447. # --- Готовим временные метки ---
  1448. my $now = DateTime->now(time_zone => 'local');
  1449. my $day_start = $now->clone->truncate(to => 'day');
  1450. my $day_stop = $day_start->clone->add(days => 1);
  1451. my $month_start = $now->clone->truncate(to => 'month');
  1452. my $month_stop = $month_start->clone->add(months => 1);
  1453. # --- Получаем список авторизаций ---
  1454. my $user_auth_list_sql = q{
  1455. SELECT A.id as auth_id, U.id, U.day_quota, U.month_quota,
  1456. A.day_quota as auth_day, A.month_quota as auth_month
  1457. FROM user_auth AS A
  1458. JOIN user_list AS U ON A.user_id = U.id
  1459. WHERE A.deleted = 0
  1460. ORDER BY user_id
  1461. };
  1462. my @authlist_ref = get_records_sql($db, $user_auth_list_sql);
  1463. my %user_stats;
  1464. my %auth_info;
  1465. foreach my $row (@authlist_ref) {
  1466. $auth_info{$row->{auth_id}}{user_id} = $row->{id};
  1467. $auth_info{$row->{auth_id}}{day_limit} = $row->{auth_day} // 0;
  1468. $auth_info{$row->{auth_id}}{month_limit} = $row->{auth_month} // 0;
  1469. $auth_info{$row->{auth_id}}{day} = 0;
  1470. $auth_info{$row->{auth_id}}{month} = 0;
  1471. $user_stats{$row->{id}}{day_limit} = $row->{day_quota} // 0;
  1472. $user_stats{$row->{id}}{month_limit} = $row->{month_quota} // 0;
  1473. $user_stats{$row->{id}}{day} = 0;
  1474. $user_stats{$row->{id}}{month} = 0;
  1475. }
  1476. # --- Считаем дневной трафик ---
  1477. my @day_stats = get_records_sql($db,
  1478. "SELECT auth_id, SUM(byte_in + byte_out) AS traf_all
  1479. FROM user_stats
  1480. WHERE ts >= ? AND ts < ?
  1481. GROUP BY auth_id",
  1482. $day_start->strftime('%Y-%m-%d %H:%M:%S'),
  1483. $day_stop->strftime('%Y-%m-%d %H:%M:%S')
  1484. );
  1485. foreach my $row (@day_stats) {
  1486. my $user_id = $auth_info{$row->{auth_id}}{user_id};
  1487. $auth_info{$row->{auth_id}}{day} = $row->{traf_all} // 0;
  1488. $user_stats{$user_id}{day} += $row->{traf_all} // 0;
  1489. }
  1490. # --- Считаем месячный трафик ---
  1491. my @month_stats = get_records_sql($db,
  1492. "SELECT auth_id, SUM(byte_in + byte_out) AS traf_all
  1493. FROM user_stats
  1494. WHERE ts >= ? AND ts < ?
  1495. GROUP BY auth_id",
  1496. $month_start->strftime('%Y-%m-%d %H:%M:%S'),
  1497. $month_stop->strftime('%Y-%m-%d %H:%M:%S')
  1498. );
  1499. foreach my $row (@month_stats) {
  1500. my $user_id = $auth_info{$row->{auth_id}}{user_id};
  1501. $auth_info{$row->{auth_id}}{month} = $row->{traf_all} // 0;
  1502. $user_stats{$user_id}{month} += $row->{traf_all} // 0;
  1503. }
  1504. # --- Блокировка по квотам для auth_id ---
  1505. foreach my $auth_id (keys %auth_info) {
  1506. next unless $auth_info{$auth_id}{day_limit} || $auth_info{$auth_id}{month_limit};
  1507. my $day_limit = ($auth_info{$auth_id}{day_limit} // 0) * $KB * $KB;
  1508. my $month_limit = ($auth_info{$auth_id}{month_limit} // 0) * $KB * $KB;
  1509. my $blocked_d = $auth_info{$auth_id}{day} > $day_limit;
  1510. my $blocked_m = $auth_info{$auth_id}{month} > $month_limit;
  1511. if ($blocked_d || $blocked_m) {
  1512. my $history_msg;
  1513. if ($blocked_d) {
  1514. $history_msg = sprintf "Day quota limit found for auth_id: %d - Current: %d Max: %d",
  1515. $auth_id, $auth_info{$auth_id}{day}, $day_limit;
  1516. }
  1517. if ($blocked_m) {
  1518. $history_msg = sprintf "Month quota limit found for auth_id: %d - Current: %d Max: %d",
  1519. $auth_id, $auth_info{$auth_id}{month}, $month_limit;
  1520. }
  1521. do_sql($db, "UPDATE user_auth SET blocked = 1, changed = 1 WHERE id = ?", $auth_id);
  1522. db_log_verbose($db, $history_msg);
  1523. }
  1524. }
  1525. # --- Блокировка по квотам для user_id ---
  1526. foreach my $user_id (keys %user_stats) {
  1527. next unless $user_stats{$user_id}{day_limit} || $user_stats{$user_id}{month_limit};
  1528. my $day_limit = ($user_stats{$user_id}{day_limit} // 0) * $KB * $KB;
  1529. my $month_limit = ($user_stats{$user_id}{month_limit} // 0) * $KB * $KB;
  1530. my $blocked_d = $user_stats{$user_id}{day} > $day_limit;
  1531. my $blocked_m = $user_stats{$user_id}{month} > $month_limit;
  1532. if ($blocked_d || $blocked_m) {
  1533. my $history_msg;
  1534. if ($blocked_d) {
  1535. $history_msg = sprintf "Day quota limit found for user_id: %d - Current: %d Max: %d",
  1536. $user_id, $user_stats{$user_id}{day}, $day_limit;
  1537. }
  1538. if ($blocked_m) {
  1539. $history_msg = sprintf "Month quota limit found for user_id: %d - Current: %d Max: %d",
  1540. $user_id, $user_stats{$user_id}{month}, $month_limit;
  1541. }
  1542. # Исправлено: user_list вместо User_user
  1543. do_sql($db, "UPDATE user_list SET blocked = 1 WHERE id = ?", $user_id);
  1544. do_sql($db, "UPDATE user_auth SET blocked = 1, changed = 1 WHERE user_id = ?", $user_id);
  1545. db_log_verbose($db, $history_msg);
  1546. }
  1547. }
  1548. Del_Variable($db, 'RECALC');
  1549. }
  1550. #--------------------------------------------------------------------------------
  1551. sub process_dhcp_request {
  1552. my ($db, $type, $mac, $ip, $hostname, $client_id, $circuit_id, $remote_id) = @_;
  1553. return unless $type && $type =~ /^(old|add|del)$/i;
  1554. my $client_hostname = '';
  1555. if ($hostname && $hostname ne 'undef' && $hostname !~ /UNDEFINED/i) {
  1556. $client_hostname = $hostname;
  1557. }
  1558. my $auth_network = $office_networks->match_string($ip);
  1559. if (!$auth_network) {
  1560. log_error("Unknown network in dhcp request! IP: $ip");
  1561. return;
  1562. }
  1563. $circuit_id //= '';
  1564. $client_id //= '';
  1565. $remote_id //= '';
  1566. my $timestamp = time();
  1567. my $ip_aton = StrToIp($ip);
  1568. return unless defined $ip_aton;
  1569. $mac = mac_splitted(isc_mac_simplify($mac));
  1570. my $dhcp_event_time = GetNowTime($timestamp);
  1571. my $dhcp_record = {
  1572. mac => $mac,
  1573. ip => $ip,
  1574. ip_aton => $ip_aton,
  1575. hostname => $client_hostname,
  1576. network => $auth_network,
  1577. type => $type,
  1578. hostname_utf8 => $client_hostname,
  1579. ts => $timestamp,
  1580. last_time => time(),
  1581. circuit_id => $circuit_id,
  1582. client_id => $client_id,
  1583. remote_id => $remote_id,
  1584. hotspot => is_hotspot($db, $ip), # Исправлено: $db вместо $dbh
  1585. };
  1586. # --- Ищем существующую запись ---
  1587. my $auth_record = get_record_sql($db,
  1588. "SELECT * FROM user_auth WHERE ip = ? AND mac = ? AND deleted = 0 ORDER BY last_found DESC",
  1589. $ip, $mac
  1590. );
  1591. # Если запись не найдена и тип 'del' — выходим
  1592. if (!$auth_record && $type eq 'del') {
  1593. return;
  1594. }
  1595. # Если запись не найдена и тип 'add'/'old' — создаём
  1596. if (!$auth_record && ($type eq 'add' || $type eq 'old')) {
  1597. my $res_id = resurrection_auth($db, $dhcp_record);
  1598. if (!$res_id) {
  1599. db_log_error($db, "Error creating an ip address record for ip=$ip and mac=$mac!");
  1600. return;
  1601. }
  1602. $auth_record = get_record_sql($db, "SELECT * FROM user_auth WHERE id = ?", $res_id);
  1603. db_log_info($db, "Check for new auth. Found id: $res_id", $res_id);
  1604. }
  1605. return unless $auth_record && $auth_record->{id};
  1606. my $auth_id = $auth_record->{id};
  1607. my $auth_ou_id = $auth_record->{ou_id};
  1608. $dhcp_record->{auth_id} = $auth_id;
  1609. $dhcp_record->{auth_ou_id} = $auth_ou_id;
  1610. # --- Логирование отладки ---
  1611. log_debug(uc($type) . ">>");
  1612. log_debug("MAC: " . $dhcp_record->{mac});
  1613. log_debug("IP: " . $dhcp_record->{ip});
  1614. log_debug("CIRCUIT-ID: " . $dhcp_record->{circuit_id});
  1615. log_debug("REMOTE-ID: " . $dhcp_record->{remote_id});
  1616. log_debug("HOSTNAME: " . $dhcp_record->{hostname});
  1617. log_debug("TYPE: " . $dhcp_record->{type});
  1618. log_debug("TIME: " . $dhcp_event_time);
  1619. log_debug("AUTH_ID: " . $auth_id);
  1620. log_debug("END GET");
  1621. update_dns_record_by_dhcp($db, $dhcp_record, $auth_record);
  1622. # --- Обработка ADD ---
  1623. if ($type eq 'add' && $dhcp_record->{hostname_utf8}) {
  1624. my $auth_rec = {
  1625. dhcp_hostname => $dhcp_record->{hostname_utf8},
  1626. dhcp_time => $dhcp_event_time,
  1627. arp_found => $dhcp_event_time,
  1628. created_by => 'dhcp',
  1629. };
  1630. db_log_verbose($db, "Add lease by dhcp event for dynamic clients id: $auth_id ip: $ip", $auth_id);
  1631. update_record($db, 'user_auth', $auth_rec, 'id = ?', $auth_id);
  1632. }
  1633. # --- Обработка OLD ---
  1634. if ($type eq 'old') {
  1635. my $auth_rec = {
  1636. dhcp_action => $type,
  1637. dhcp_time => $dhcp_event_time,
  1638. created_by => 'dhcp',
  1639. arp_found => $dhcp_event_time,
  1640. };
  1641. db_log_verbose($db, "Update lease by dhcp event for dynamic clients id: $auth_id ip: $ip", $auth_id);
  1642. update_record($db, 'user_auth', $auth_rec, 'id = ?', $auth_id);
  1643. }
  1644. # --- Обработка DEL ---
  1645. if ($type eq 'del' && $auth_id) {
  1646. if ($auth_record->{dhcp_time} =~ /^(\d{4})-(\d{2})-(\d{2}) (\d{2}):(\d{2}):(\d{2})$/) {
  1647. my $d_time = mktime($6, $5, $4, $3, $2 - 1, $1 - 1900);
  1648. if (time() - $d_time > 60 && (is_dynamic_ou($db, $auth_ou_id) || is_default_ou($db, $auth_ou_id))) {
  1649. db_log_info($db, "Remove user ip record by dhcp release event for dynamic clients id: $auth_id ip: $ip", $auth_id);
  1650. my $auth_rec = {
  1651. dhcp_action => $type,
  1652. dhcp_time => $dhcp_event_time,
  1653. };
  1654. update_record($db, 'user_auth', $auth_rec, 'id = ?', $auth_id);
  1655. # Удаляем запись, если она из динамического или дефолтного пула
  1656. if (is_default_ou($db, $auth_ou_id) || (is_dynamic_ou($db, $auth_ou_id) && $auth_record->{dynamic})) {
  1657. delete_user_auth($db, $auth_id);
  1658. # Проверяем, остались ли другие записи у пользователя
  1659. my $u_count = get_record_sql($db,
  1660. "SELECT COUNT(*) AS cnt FROM user_auth WHERE deleted = 0 AND user_id = ?",
  1661. $auth_record->{user_id}
  1662. );
  1663. if ($u_count && $u_count->{cnt} == 0) {
  1664. delete_user($db, $auth_record->{user_id});
  1665. }
  1666. }
  1667. }
  1668. }
  1669. }
  1670. # --- Пропуск логирования для hotspot или ignore_update_dhcp_event ---
  1671. if ($dhcp_record->{hotspot} && $ignore_hotspot_dhcp_log) {
  1672. return $dhcp_record;
  1673. }
  1674. if ($ignore_update_dhcp_event && $type eq 'old') {
  1675. return $dhcp_record;
  1676. }
  1677. # --- Логируем событие ---
  1678. my $dhcp_log = {
  1679. auth_id => $auth_id // 0,
  1680. ip => $ip,
  1681. ip_int => $ip_aton,
  1682. mac => $mac,
  1683. action => $type,
  1684. dhcp_hostname => $client_hostname,
  1685. ts => $dhcp_event_time,
  1686. circuit_id => $circuit_id,
  1687. client_id => $client_id,
  1688. remote_id => $remote_id,
  1689. };
  1690. insert_record($db, 'dhcp_log', $dhcp_log);
  1691. return $dhcp_record;
  1692. }
  1693. 1;
  1694. }