mirror of
https://github.com/sileht/bird-lg.git
synced 2024-11-16 04:14:43 +01:00
730 lines
24 KiB
Python
730 lines
24 KiB
Python
#!/usr/bin/python
|
|
# -*- coding: utf-8 -*-
|
|
# vim: ts=4
|
|
###
|
|
#
|
|
# Copyright (c) 2012 Mehdi Abaakouk
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License version 3 as
|
|
# published by the Free Software Foundation
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
#
|
|
###
|
|
|
|
import base64
|
|
from datetime import datetime
|
|
import subprocess
|
|
import logging
|
|
from logging.handlers import TimedRotatingFileHandler
|
|
import re
|
|
from urllib2 import urlopen
|
|
from urllib import quote, unquote
|
|
import json
|
|
import random
|
|
import argparse
|
|
|
|
from toolbox import mask_is_valid, ipv6_is_valid, ipv4_is_valid, resolve, save_cache_pickle, load_cache_pickle, unescape
|
|
#from xml.sax.saxutils import escape
|
|
|
|
|
|
import pydot
|
|
from flask import Flask, render_template, render_template_string, jsonify, redirect, session, request, abort, Response, Markup
|
|
parser = argparse.ArgumentParser()
|
|
parser.add_argument('-c', dest='config_file', help='path to config file', default='lg.cfg')
|
|
args = parser.parse_args()
|
|
|
|
|
|
app = Flask(__name__)
|
|
app.config.from_pyfile(args.config_file)
|
|
app.secret_key = app.config["SESSION_KEY"]
|
|
app.debug = app.config["DEBUG"]
|
|
|
|
file_handler = TimedRotatingFileHandler(filename=app.config["LOG_FILE"], when="midnight", backupCount=app.config.get("LOG_NUM_DAYS", 0))
|
|
file_handler.setLevel(getattr(logging, app.config["LOG_LEVEL"].upper()))
|
|
app.logger.addHandler(file_handler)
|
|
|
|
|
|
def get_asn_from_as(n):
|
|
asn_zone = app.config.get("ASN_ZONE", "asn.cymru.com")
|
|
try:
|
|
data = resolve("AS%s.%s" % (n, asn_zone) ,"TXT").replace("'","").replace('"','')
|
|
except:
|
|
return " "*5
|
|
return [ field.strip() for field in data.split("|") ]
|
|
|
|
|
|
def add_links(text):
|
|
"""Browser a string and replace ipv4, ipv6, as number, with a
|
|
whois link """
|
|
|
|
if type(text) in [str, unicode]:
|
|
text = text.split("\n")
|
|
|
|
ret_text = []
|
|
for line in text:
|
|
# Some heuristic to create link
|
|
if line.strip().startswith("BGP.as_path:") or \
|
|
line.strip().startswith("Neighbor AS:"):
|
|
ret_text.append(re.sub(r'(\d+)', r'<a href="/whois?q=\1" class="whois">\1</a>', line))
|
|
else:
|
|
line = re.sub(r'([a-zA-Z0-9\-]*\.([a-zA-Z]{2,3}){1,2})(\s|$)', r'<a href="/whois?q=\1" class="whois">\1</a>\3', line)
|
|
line = re.sub(r'(?<=\[)AS(\d+)', r'<a href="/whois?q=\1" class="whois">AS\1</a>', line)
|
|
line = re.sub(r'(\d+\.\d+\.\d+\.\d+)', r'<a href="/whois?q=\1" class="whois">\1</a>', line)
|
|
if len(request.path) >= 2:
|
|
hosts = "/".join(request.path.split("/")[2:])
|
|
else:
|
|
hosts = "/"
|
|
line = re.sub(r'\[(\w+)\s+((|\d\d\d\d-\d\d-\d\d\s)(|\d\d:)\d\d:\d\d|\w\w\w\d\d)', r'[<a href="/detail/%s?q=\1">\1</a> \2' % hosts, line)
|
|
line = re.sub(r'(^|\s+)(([a-f\d]{0,4}:){3,10}[a-f\d]{0,4})', r'\1<a href="/whois?q=\2" class="whois">\2</a>', line, re.I)
|
|
ret_text.append(line)
|
|
return "\n".join(ret_text)
|
|
|
|
|
|
def set_session(request_type, hosts, proto, request_args):
|
|
""" Store all data from user in the user session """
|
|
session.permanent = True
|
|
session.update({
|
|
"request_type": request_type,
|
|
"hosts": hosts,
|
|
"proto": proto,
|
|
"request_args": request_args,
|
|
})
|
|
history = session.get("history", [])
|
|
|
|
# erase old format history
|
|
if type(history) != type(list()):
|
|
history = []
|
|
|
|
t = (hosts, proto, request_type, request_args)
|
|
if t in history:
|
|
del history[history.index(t)]
|
|
history.insert(0, t)
|
|
session["history"] = history[:20]
|
|
|
|
|
|
def whois_command(query):
|
|
server = []
|
|
if app.config.get("WHOIS_SERVER", ""):
|
|
server = [ "-h", app.config.get("WHOIS_SERVER") ]
|
|
return subprocess.Popen(['whois'] + server + [query], stdout=subprocess.PIPE).communicate()[0].decode('utf-8', 'ignore')
|
|
|
|
|
|
def bird_command(host, proto, query):
|
|
"""Alias to bird_proxy for bird service"""
|
|
return bird_proxy(host, proto, "bird", query)
|
|
|
|
|
|
def bird_proxy(host, proto, service, query):
|
|
"""Retreive data of a service from a running lgproxy on a remote node
|
|
|
|
First and second arguments are the node and the port of the running lgproxy
|
|
Third argument is the service, can be "traceroute" or "bird"
|
|
Last argument, the query to pass to the service
|
|
|
|
return tuple with the success of the command and the returned data
|
|
"""
|
|
|
|
path = ""
|
|
if proto == "ipv6":
|
|
path = service + "6"
|
|
elif proto == "ipv4":
|
|
path = service
|
|
|
|
port = app.config["PROXY"].get(host, "")
|
|
|
|
if not port:
|
|
return False, 'Host "%s" invalid' % host
|
|
elif not path:
|
|
return False, 'Proto "%s" invalid' % proto
|
|
|
|
url = "http://%s" % (host)
|
|
if "DOMAIN" in app.config:
|
|
url = "%s.%s" % (url, app.config["DOMAIN"])
|
|
url = "%s:%d/%s?" % (url, port, path)
|
|
if "SHARED_SECRET" in app.config:
|
|
url = "%ssecret=%s&" % (url, app.config["SHARED_SECRET"])
|
|
url = "%sq=%s" % (url, quote(query))
|
|
|
|
try:
|
|
f = urlopen(url)
|
|
resultat = f.read()
|
|
status = True # retreive remote status
|
|
except IOError:
|
|
resultat = "Failed to retrieve URL for host %s" % host
|
|
app.logger.warning("Failed to retrieve URL for host %s: %s", host, url)
|
|
status = False
|
|
|
|
return status, resultat
|
|
|
|
|
|
@app.context_processor
|
|
def inject_commands():
|
|
commands = [
|
|
("traceroute", "traceroute ..."),
|
|
("summary", "show protocols"),
|
|
("detail", "show protocols ... all"),
|
|
("prefix", "show route for ..."),
|
|
("prefix_detail", "show route for ... all"),
|
|
("prefix_bgpmap", "show route for ... (bgpmap)"),
|
|
("where", "show route where net ~ [ ... ]"),
|
|
("where_detail", "show route where net ~ [ ... ] all"),
|
|
("where_bgpmap", "show route where net ~ [ ... ] (bgpmap)"),
|
|
("adv", "show route ..."),
|
|
("adv_bgpmap", "show route ... (bgpmap)"),
|
|
]
|
|
|
|
commands = [i for i in commands if i[0] not in app.config.get("BLACKLIST_COMMANDS", [])]
|
|
commands_dict = {}
|
|
for id, text in commands:
|
|
commands_dict[id] = text
|
|
return dict(commands=commands, commands_dict=commands_dict)
|
|
|
|
|
|
@app.context_processor
|
|
def inject_all_host():
|
|
return dict(all_hosts="+".join(app.config["PROXY"].keys()))
|
|
|
|
|
|
@app.route("/")
|
|
def hello():
|
|
if app.config.get("DEFAULT_TEMPLATE", False):
|
|
# initializes session with first command of commands_dict, first host and ipv4 for rendering layout.html.
|
|
first_command = next(iter(inject_commands()['commands_dict']))
|
|
set_session(first_command, "+".join(app.config["PROXY"].keys()), "ipv4", "")
|
|
|
|
# usage of open + render_template_string instead of render_template allows
|
|
# file location outside of template directory.
|
|
with open(app.config.get("DEFAULT_TEMPLATE"), 'r') as filehandle:
|
|
filecontent = filehandle.read()
|
|
return render_template_string(filecontent)
|
|
|
|
return redirect("/summary/%s/ipv4" % "+".join(app.config["PROXY"].keys()))
|
|
|
|
|
|
def error_page(text):
|
|
return render_template('error.html', errors=[text]), 500
|
|
|
|
|
|
@app.errorhandler(400)
|
|
def incorrect_request(e):
|
|
return render_template('error.html', warnings=["The server could not understand the request"]), 400
|
|
|
|
|
|
@app.errorhandler(404)
|
|
def page_not_found(e):
|
|
return render_template('error.html', warnings=["The requested URL was not found on the server."]), 404
|
|
|
|
def get_query():
|
|
q = unquote(request.args.get('q', '').strip())
|
|
return q
|
|
|
|
@app.route("/whois")
|
|
def whois():
|
|
query = get_query()
|
|
if not query:
|
|
abort(400)
|
|
|
|
try:
|
|
asnum = int(query)
|
|
query = "as%d" % asnum
|
|
except:
|
|
m = re.match(r"[\w\d-]*\.(?P<domain>[\d\w-]+\.[\d\w-]+)$", query)
|
|
if m:
|
|
query = query.groupdict()["domain"]
|
|
|
|
output = whois_command(query)
|
|
return jsonify(output=output, title=query)
|
|
|
|
|
|
SUMMARY_UNWANTED_PROTOS = ["Kernel", "Static", "Device", "Direct"]
|
|
|
|
@app.route("/summary/<hosts>")
|
|
@app.route("/summary/<hosts>/<proto>")
|
|
def summary(hosts, proto="ipv4"):
|
|
if 'summary' not in iter(inject_commands()['commands_dict']):
|
|
return render_template('error.html', errors=["Access denied"]), 403
|
|
|
|
set_session("summary", hosts, proto, "")
|
|
command = "show protocols"
|
|
|
|
summary = {}
|
|
errors = []
|
|
for host in hosts.split("+"):
|
|
ret, res = bird_command(host, proto, command)
|
|
res = res.split("\n")
|
|
|
|
if ret is False:
|
|
errors.append("%s" % res)
|
|
continue
|
|
|
|
if len(res) <= 1:
|
|
errors.append("%s: bird command failed with error, %s" % (host, "\n".join(res)))
|
|
continue
|
|
|
|
data = []
|
|
for line in res[1:]:
|
|
line = line.strip()
|
|
if line and (line.split() + [""])[1] not in SUMMARY_UNWANTED_PROTOS:
|
|
split = line.split()
|
|
if len(split) >= 5:
|
|
props = dict()
|
|
props["name"] = split[0]
|
|
props["proto"] = split[1]
|
|
props["table"] = split[2]
|
|
props["state"] = split[3]
|
|
props["since"] = split[4]
|
|
props["info"] = ' '.join(split[5:]) if len(split) > 5 else ""
|
|
data.append(props)
|
|
else:
|
|
app.logger.warning("couldn't parse: %s", line)
|
|
|
|
summary[host] = data
|
|
|
|
return render_template('summary.html', summary=summary, command=command, errors=errors)
|
|
|
|
|
|
@app.route("/detail/<hosts>/<proto>")
|
|
def detail(hosts, proto):
|
|
if 'detail' not in iter(inject_commands()['commands_dict']):
|
|
return render_template('error.html', errors=["Access denied"]), 403
|
|
|
|
name = get_query()
|
|
|
|
if not name:
|
|
abort(400)
|
|
|
|
set_session("detail", hosts, proto, name)
|
|
command = "show protocols all %s" % name
|
|
|
|
detail = {}
|
|
errors = []
|
|
for host in hosts.split("+"):
|
|
ret, res = bird_command(host, proto, command)
|
|
res = res.split("\n")
|
|
|
|
if ret is False:
|
|
errors.append("%s" % res)
|
|
continue
|
|
|
|
if len(res) <= 1:
|
|
errors.append("%s: bird command failed with error, %s" % (host, "\n".join(res)))
|
|
continue
|
|
|
|
detail[host] = {"status": res[1], "description": add_links(res[2:])}
|
|
|
|
return render_template('detail.html', detail=detail, command=command, errors=errors)
|
|
|
|
|
|
@app.route("/traceroute/<hosts>/<proto>")
|
|
def traceroute(hosts, proto):
|
|
if 'traceroute' not in iter(inject_commands()['commands_dict']):
|
|
return render_template('error.html', errors=["Access denied"]), 403
|
|
|
|
q = get_query()
|
|
|
|
if not q:
|
|
abort(400)
|
|
|
|
set_session("traceroute", hosts, proto, q)
|
|
|
|
if proto == "ipv6" and not ipv6_is_valid(q):
|
|
try:
|
|
q = resolve(q, "AAAA")
|
|
except:
|
|
return error_page("%s is unresolvable or invalid for %s" % (q, proto))
|
|
if proto == "ipv4" and not ipv4_is_valid(q):
|
|
try:
|
|
q = resolve(q, "A")
|
|
except:
|
|
return error_page("%s is unresolvable or invalid for %s" % (q, proto))
|
|
|
|
errors = []
|
|
infos = {}
|
|
for host in hosts.split("+"):
|
|
status, resultat = bird_proxy(host, proto, "traceroute", q)
|
|
if status is False:
|
|
errors.append("%s" % resultat)
|
|
continue
|
|
|
|
|
|
infos[host] = add_links(resultat)
|
|
return render_template('traceroute.html', infos=infos, errors=errors)
|
|
|
|
|
|
@app.route("/adv/<hosts>/<proto>")
|
|
def show_route_filter(hosts, proto):
|
|
if 'adv' not in iter(inject_commands()['commands_dict']):
|
|
return render_template('error.html', errors=["Access denied"]), 403
|
|
|
|
return show_route("adv", hosts, proto)
|
|
|
|
|
|
@app.route("/adv_bgpmap/<hosts>/<proto>")
|
|
def show_route_filter_bgpmap(hosts, proto):
|
|
if 'adv_bgpmap' not in iter(inject_commands()['commands_dict']):
|
|
return render_template('error.html', errors=["Access denied"]), 403
|
|
|
|
return show_route("adv_bgpmap", hosts, proto)
|
|
|
|
|
|
@app.route("/where/<hosts>/<proto>")
|
|
def show_route_where(hosts, proto):
|
|
if 'where' not in iter(inject_commands()['commands_dict']):
|
|
return render_template('error.html', errors=["Access denied"]), 403
|
|
|
|
return show_route("where", hosts, proto)
|
|
|
|
|
|
@app.route("/where_detail/<hosts>/<proto>")
|
|
def show_route_where_detail(hosts, proto):
|
|
if 'where_detail' not in iter(inject_commands()['commands_dict']):
|
|
return render_template('error.html', errors=["Access denied"]), 403
|
|
|
|
return show_route("where_detail", hosts, proto)
|
|
|
|
|
|
@app.route("/where_bgpmap/<hosts>/<proto>")
|
|
def show_route_where_bgpmap(hosts, proto):
|
|
if 'where_bgpmap' not in iter(inject_commands()['commands_dict']):
|
|
return render_template('error.html', errors=["Access denied"]), 403
|
|
|
|
return show_route("where_bgpmap", hosts, proto)
|
|
|
|
|
|
@app.route("/prefix/<hosts>/<proto>")
|
|
def show_route_for(hosts, proto):
|
|
if 'prefix' not in iter(inject_commands()['commands_dict']):
|
|
return render_template('error.html', errors=["Access denied"]), 403
|
|
|
|
return show_route("prefix", hosts, proto)
|
|
|
|
|
|
@app.route("/prefix_detail/<hosts>/<proto>")
|
|
def show_route_for_detail(hosts, proto):
|
|
if 'prefix_detail' not in iter(inject_commands()['commands_dict']):
|
|
return render_template('error.html', errors=["Access denied"]), 403
|
|
|
|
return show_route("prefix_detail", hosts, proto)
|
|
|
|
|
|
@app.route("/prefix_bgpmap/<hosts>/<proto>")
|
|
def show_route_for_bgpmap(hosts, proto):
|
|
if 'prefix_bgpmap' not in iter(inject_commands()['commands_dict']):
|
|
return render_template('error.html', errors=["Access denied"]), 403
|
|
|
|
return show_route("prefix_bgpmap", hosts, proto)
|
|
|
|
|
|
def get_as_name(_as):
|
|
"""Returns a string that contain the as number following by the as name
|
|
"""
|
|
if not _as:
|
|
return "AS?????"
|
|
|
|
if not _as.isdigit():
|
|
return _as.strip()
|
|
|
|
name = get_asn_from_as(_as)[-1].replace(" ", "\r", 1)
|
|
return "AS%s | %s" % (_as, name)
|
|
|
|
|
|
def get_as_number_from_protocol_name(host, proto, protocol):
|
|
ret, res = bird_command(host, proto, "show protocols all %s" % protocol)
|
|
re_asnumber = re.search("Neighbor AS:\s*(\d*)", res)
|
|
if re_asnumber:
|
|
return re_asnumber.group(1)
|
|
else:
|
|
return "?????"
|
|
|
|
|
|
@app.route("/bgpmap/")
|
|
def show_bgpmap():
|
|
"""return a bgp map in a png file, from the json tree in q argument"""
|
|
|
|
data = get_query()
|
|
if not data:
|
|
abort(400)
|
|
|
|
data = base64.b64decode(data)
|
|
data = json.loads(data)
|
|
|
|
graph = pydot.Dot('BGPMAP', graph_type='digraph')
|
|
|
|
nodes = {}
|
|
edges = {}
|
|
prepend_as = {}
|
|
|
|
def escape(label):
|
|
label = label.replace("&", "&")
|
|
label = label.replace(">", ">")
|
|
label = label.replace("<", "<")
|
|
return label
|
|
|
|
def add_node(_as, **kwargs):
|
|
if _as not in nodes:
|
|
kwargs["label"] = '<<TABLE CELLBORDER="0" BORDER="0" CELLPADDING="0" CELLSPACING="0"><TR><TD ALIGN="CENTER">' + escape(kwargs.get("label", get_as_name(_as))).replace("\r","<BR/>") + "</TD></TR></TABLE>>"
|
|
nodes[_as] = pydot.Node(_as, style="filled", fontsize="10", **kwargs)
|
|
graph.add_node(nodes[_as])
|
|
return nodes[_as]
|
|
|
|
def add_edge(_previous_as, _as, **kwargs):
|
|
kwargs["splines"] = "true"
|
|
force = kwargs.get("force", False)
|
|
|
|
edge_tuple = (_previous_as, _as)
|
|
if force or edge_tuple not in edges:
|
|
edge = pydot.Edge(*edge_tuple, **kwargs)
|
|
graph.add_edge(edge)
|
|
edges[edge_tuple] = edge
|
|
elif "label" in kwargs and kwargs["label"]:
|
|
e = edges[edge_tuple]
|
|
|
|
label_without_star = kwargs["label"].replace("*", "")
|
|
if e.get_label() is not None:
|
|
labels = e.get_label().split("\r")
|
|
else:
|
|
return edges[edge_tuple]
|
|
if "%s*" % label_without_star not in labels:
|
|
labels = [ kwargs["label"] ] + [ l for l in labels if not l.startswith(label_without_star) ]
|
|
labels = sorted(labels, cmp=lambda x,y: x.endswith("*") and -1 or 1)
|
|
label = escape("\r".join(labels))
|
|
e.set_label(label)
|
|
return edges[edge_tuple]
|
|
|
|
for host, asmaps in data.iteritems():
|
|
if "DOMAIN" in app.config:
|
|
add_node(host, label= "%s\r%s" % (host.upper(), app.config["DOMAIN"].upper()), shape="box", fillcolor="#F5A9A9")
|
|
else:
|
|
add_node(host, label= "%s" % (host.upper()), shape="box", fillcolor="#F5A9A9")
|
|
|
|
as_number = app.config["AS_NUMBER"].get(host, None)
|
|
if as_number:
|
|
node = add_node(as_number, fillcolor="#F5A9A9")
|
|
edge = add_edge(as_number, nodes[host])
|
|
edge.set_color("red")
|
|
edge.set_style("bold")
|
|
|
|
#colors = [ "#009e23", "#1a6ec1" , "#d05701", "#6f879f", "#939a0e", "#0e9a93", "#9a0e85", "#56d8e1" ]
|
|
previous_as = None
|
|
hosts = data.keys()
|
|
for host, asmaps in data.iteritems():
|
|
first = True
|
|
for asmap in asmaps:
|
|
previous_as = host
|
|
color = "#%x" % random.randint(0, 16777215)
|
|
|
|
hop = False
|
|
hop_label = ""
|
|
for _as in asmap:
|
|
if _as == previous_as:
|
|
if not prepend_as.get(_as, None):
|
|
prepend_as[_as] = {}
|
|
if not prepend_as[_as].get(host, None):
|
|
prepend_as[_as][host] = {}
|
|
if not prepend_as[_as][host].get(asmap[0], None):
|
|
prepend_as[_as][host][asmap[0]] = 1
|
|
prepend_as[_as][host][asmap[0]] += 1
|
|
continue
|
|
|
|
if not hop:
|
|
hop = True
|
|
if _as not in hosts:
|
|
hop_label = _as
|
|
if first:
|
|
hop_label = hop_label + "*"
|
|
continue
|
|
else:
|
|
hop_label = ""
|
|
|
|
if _as == asmap[-1]:
|
|
add_node(_as, fillcolor="#F5A9A9", shape="box", )
|
|
else:
|
|
add_node(_as, fillcolor=(first and "#F5A9A9" or "white"), )
|
|
if hop_label:
|
|
edge = add_edge(nodes[previous_as], nodes[_as], label=hop_label, fontsize="7")
|
|
else:
|
|
edge = add_edge(nodes[previous_as], nodes[_as], fontsize="7")
|
|
|
|
hop_label = ""
|
|
|
|
if first or _as == asmap[-1]:
|
|
edge.set_style("bold")
|
|
edge.set_color("red")
|
|
elif edge.get_style() != "bold":
|
|
edge.set_style("dashed")
|
|
edge.set_color(color)
|
|
|
|
previous_as = _as
|
|
first = False
|
|
|
|
for _as in prepend_as:
|
|
for n in set([ n for h, d in prepend_as[_as].iteritems() for p, n in d.iteritems() ]):
|
|
graph.add_edge(pydot.Edge(*(_as, _as), label=" %dx" % n, color="grey", fontcolor="grey"))
|
|
|
|
fmt = request.args.get('fmt', 'png')
|
|
#response = Response("<pre>" + graph.create_dot() + "</pre>")
|
|
if fmt == "png":
|
|
response = Response(graph.create_png(), mimetype='image/png')
|
|
elif fmt == "svg":
|
|
response = Response(graph.create_svg(), mimetype='image/svg+xml')
|
|
else:
|
|
abort(400, "Incorrect format")
|
|
response.headers['Last-Modified'] = datetime.now()
|
|
response.headers['Cache-Control'] = 'no-store, no-cache, must-revalidate, post-check=0, pre-check=0, max-age=0'
|
|
response.headers['Pragma'] = 'no-cache'
|
|
response.headers['Expires'] = '-1'
|
|
return response
|
|
|
|
|
|
|
|
def build_as_tree_from_raw_bird_ouput(host, proto, text):
|
|
"""Extract the as path from the raw bird "show route all" command"""
|
|
|
|
path = None
|
|
paths = []
|
|
net_dest = None
|
|
peer_protocol_name = ""
|
|
for line in text:
|
|
line = line.strip()
|
|
|
|
expr = re.search(r'(.*)unicast\s+\[(\w+)\s+', line)
|
|
if expr:
|
|
if expr.group(1).strip():
|
|
net_dest = expr.group(1).strip()
|
|
peer_protocol_name = expr.group(2).strip()
|
|
|
|
expr2 = re.search(r'(.*)via\s+([0-9a-fA-F:\.]+)\s+on\s+\S+(\s+\[(\w+)\s+)?', line)
|
|
if expr2:
|
|
if path:
|
|
path.append(net_dest)
|
|
paths.append(path)
|
|
path = None
|
|
|
|
if expr2.group(1).strip():
|
|
net_dest = expr2.group(1).strip()
|
|
|
|
peer_ip = expr2.group(2).strip()
|
|
if expr2.group(4):
|
|
peer_protocol_name = expr2.group(4).strip()
|
|
# Check if via line is a internal route
|
|
for rt_host, rt_ips in app.config["ROUTER_IP"].iteritems():
|
|
# Special case for internal routing
|
|
if peer_ip in rt_ips:
|
|
path = [rt_host]
|
|
break
|
|
else:
|
|
# ugly hack for good printing
|
|
path = [ peer_protocol_name ]
|
|
# path = ["%s\r%s" % (peer_protocol_name, get_as_name(get_as_number_from_protocol_name(host, proto, peer_protocol_name)))]
|
|
|
|
expr3 = re.search(r'(.*)unreachable\s+\[(\w+)\s+', line)
|
|
if expr3:
|
|
if path:
|
|
path.append(net_dest)
|
|
paths.append(path)
|
|
path = None
|
|
|
|
if path is None:
|
|
path = [ expr3.group(2).strip() ]
|
|
|
|
if expr3.group(1).strip():
|
|
net_dest = expr3.group(1).strip()
|
|
|
|
if line.startswith("BGP.as_path:"):
|
|
ASes = line.replace("BGP.as_path:", "").strip().split(" ")
|
|
if path:
|
|
path.extend(ASes)
|
|
else:
|
|
path = ASes
|
|
|
|
if path:
|
|
path.append(net_dest)
|
|
paths.append(path)
|
|
|
|
return paths
|
|
|
|
|
|
def show_route(request_type, hosts, proto):
|
|
expression = get_query()
|
|
if not expression:
|
|
abort(400)
|
|
|
|
set_session(request_type, hosts, proto, expression)
|
|
|
|
bgpmap = request_type.endswith("bgpmap")
|
|
|
|
all = (request_type.endswith("detail") and " all" or "")
|
|
if bgpmap:
|
|
all = " all"
|
|
|
|
if request_type.startswith("adv"):
|
|
command = "show route " + expression.strip()
|
|
if bgpmap and not command.endswith("all"):
|
|
command = command + " all"
|
|
elif request_type.startswith("where"):
|
|
command = "show route where net ~ [ " + expression + " ]" + all
|
|
else:
|
|
mask = ""
|
|
if len(expression.split("/")) == 2:
|
|
expression, mask = (expression.split("/"))
|
|
|
|
if not mask and proto == "ipv4":
|
|
mask = "32"
|
|
if not mask and proto == "ipv6":
|
|
mask = "128"
|
|
if not mask_is_valid(mask):
|
|
return error_page("mask %s is invalid" % mask)
|
|
|
|
if proto == "ipv6" and not ipv6_is_valid(expression):
|
|
try:
|
|
expression = resolve(expression, "AAAA")
|
|
except:
|
|
return error_page("%s is unresolvable or invalid for %s" % (expression, proto))
|
|
if proto == "ipv4" and not ipv4_is_valid(expression):
|
|
try:
|
|
expression = resolve(expression, "A")
|
|
except:
|
|
return error_page("%s is unresolvable or invalid for %s" % (expression, proto))
|
|
|
|
if mask:
|
|
expression += "/" + mask
|
|
|
|
command = "show route for " + expression + all
|
|
|
|
detail = {}
|
|
errors = []
|
|
for host in hosts.split("+"):
|
|
ret, res = bird_command(host, proto, command)
|
|
res = res.split("\n")
|
|
|
|
if ret is False:
|
|
errors.append("%s" % res)
|
|
continue
|
|
|
|
if len(res) <= 1:
|
|
errors.append("%s: bird command failed with error, %s" % (host, "\n".join(res)))
|
|
continue
|
|
|
|
if bgpmap:
|
|
detail[host] = build_as_tree_from_raw_bird_ouput(host, proto, res)
|
|
else:
|
|
detail[host] = add_links(res)
|
|
|
|
if bgpmap:
|
|
detail = base64.b64encode(json.dumps(detail))
|
|
|
|
return render_template((bgpmap and 'bgpmap.html' or 'route.html'), detail=detail, command=command, expression=expression, errors=errors)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
app.run(app.config.get("BIND_IP", "0.0.0.0"), app.config.get("BIND_PORT", 5000))
|